Search is not available for this dataset
id
stringlengths
2
6
title
stringlengths
1
89
context
stringlengths
12
2.62k
question
stringlengths
6
1.07k
answer_start
int64
0
1.66k
answer
stringlengths
1
291
article
stringlengths
377
265k
chunked_article
list
134690
Malware
Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software.
what are redirect affiliate marketing revenues called ?
138
spyware
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134691
Malware
Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software.
how are programs generally installed ?
232
exploiting security holes
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134695
Malware
Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.
some malware is used to generate what ?
42
click fraud
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134696
Malware
Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.
in what year was some malware used ?
200
2012
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134697
Malware
Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.
what percentage of malware used some kind of click fraud ?
216
60 to 70%
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134698
Malware
Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.
what percentage of malware were fraudulent in 2012 ?
283
22%
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134736
Malware
The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.
in what year did us government agencies become diverting computers ?
206
2014
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134737
Malware
The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.
what may be installed by worms ?
540
Trojan horses, worms, implants, or other methods
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134799
Malware
The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.
what type of computers did the first worms ?
70
personal computers
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134800
Malware
The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.
what was the first well-known worm ?
158
Internet Worm of 1988
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134801
Malware
The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.
what did the first worm worm of 1988 cause ?
196
SunOS and VAX BSD systems
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs ("jokeware") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls. === "Air gap" isolation or "parallel network" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video
[ "Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e.", "Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers).Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.", "According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.", "Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems.", "Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the electricity distribution network.The defense strategies against malware differ according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches, securing networks from intrusion, having regular backups and isolating infected systems. Malware can be designed to evade antivirus software detection algorithms. == History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.", "== History == The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.", "His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks.", "The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted.", "By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan.", "The first IBM PC virus in the \"wild\" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it.", "For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments.", "Users may also execute disguised malicious email attachments. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.", "The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process.", "Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.", "This same behavior is used by today's worms as well.With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks.", "These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information.", "Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate. == Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit.", "== Purposes == Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.", "Infected \"zombie computers\" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general.", "Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment.", "Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as \"computer killing.\" Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).", "Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). == Types == There are many possible ways of categorizing malware and some malicious software may overlap into two or more categories. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.", "Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware. === Malware === ==== Virus ==== A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to biological viruses.", "They have been likened to biological viruses. They have been likened to biological viruses. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.", "A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. ==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.", "==== Worm ==== A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. ==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection.", "==== Rootkits ==== Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves.", "Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.", "An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.", "The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system. ==== Backdoors ==== A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application.", "The attacker typically uses another attack (such as a trojan, worm or virus) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a software bug in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified.", "The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered \"targets\" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.", "Backdoors may be installed by Trojan horses, worms, implants, or other methods. ==== Trojan horse ==== A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.", "A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download.", "The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.", "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed.", "While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.", "Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.", "Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. ==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.", "==== Droppers ==== Droppers are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.", "A dropper merely downloads further malware to the system. A dropper merely downloads further malware to the system. ==== Ransomware ==== Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents.", "Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser.", "For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.", "It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine.", "Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.", "Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. === Grayware === Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools.", "Types of greyware typically includes spyware, adware, fraudulent dialers, joke programs (\"jokeware\") and remote access tools. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying. ==== Potentially Unwanted Program (PUP) ==== Potentially unwanted programs (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.", "PUPs include spyware, adware, and fraudulent dialers. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et. al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.", "(2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. ==== Adware ==== Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available. ==== Spyware ==== Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes.", "Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. == Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.", "== Detection == Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.", "Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to detect it.", "The second is that malware uses technical measures to make it more difficult to detect it. An estimated 33% of malware is not detected by antivirus software.The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory.", "The stub decrypts the blob and loads it into memory. Because anntivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware.", "This is known as polymorphic malware. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by fingerprinting the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion.", "This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts.", "This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) obfuscating internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.", "The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.", "Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. == Risks == === Vulnerable software === A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows.", "For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE.", "older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.", "For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch.", "Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.", "Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network. === Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this.", "=== Excessive privileges === Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users.", "Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system.", "This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.", "In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.", "Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. === Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.", "=== Weak passwords === A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk.", "Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. === Use of the same operating system === Homogeneity can be a vulnerability.", "=== Use of the same operating system === Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10.", "It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. == Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware.", "== Mitigation == === Antivirus / Anti-malware software === Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).", "Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.Typically, antivirus software can combat malware in the following ways: Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.", "This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.", "Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.", "This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match. Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).", "Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from). ==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system.", "==== Real-time protection ==== A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not.", "Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.", "This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory. ==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.", "==== Sandboxing ==== Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to \"sandbox\" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done. === Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.", "=== Website security scans === Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. === Network Segregation === Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.", "Software Defined Networking provides techniques to implement such controls. Software Defined Networking provides techniques to implement such controls. === \"Air gap\" isolation or \"parallel network\" === As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an \"air gap\" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world.", "completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.", "Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. == See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int.", "== See also == == References == == External links == Malicious Software at Curlie Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive) Advanced Malware Cleaning – a Microsoft video" ]
134838
Organized crime
The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.
what does the criminal organization consist of ?
110
legal, social and economic risk to determine potential profit and loss from certain criminal activities
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134839
Organized crime
The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.
what is a key factor -- the organized criminal or criminal group ?
366
Opportunism
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134861
Organized crime
The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets.
what does the policy aim to make ?
39
the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134865
Organized crime
The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.
where is crime perpetrated ?
471
liminal state between legitimate and illegitimate markets
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134866
Organized crime
Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.
what is identity theft a form of ?
28
fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134867
Organized crime
Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.
who assumed victims of identity theft ?
322
the identity thief
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134868
Organized crime
Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime.
what is the unauthorized or prohibited use of works ?
0
Copyright infringement
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134869
Organized crime
Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime.
what is copyright infringement ?
26
the unauthorized or prohibited use of works under copyright
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134870
Organized crime
Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime.
what happens to copyright infringement ?
87
infringing the copyright holder's exclusive rights
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134871
Organized crime
Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime.
what is an example of a copyright holder ?
147
the right to reproduce or perform the copyrighted work
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134872
Organized crime
Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime.
who requires that signatory countries establish criminal procedures of intellectual property rights ?
406
Article 61
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134873
Organized crime
Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime.
what does trips stand for ?
462
Intellectual Property Rights
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134880
Organized crime
Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting.
when was the labor racketeering developed ?
43
1930s
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134881
Organized crime
Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting.
what are some of the labor racketeering ?
101
mining, energy production and transportation sectors immensely
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134882
Organized crime
Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting.
what are the importation of the political corruption ?
208
cheap or unfree labor
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134883
Organized crime
Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting.
what are the political corruption ?
248
union and public officials
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134884
Organized crime
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
what is the use of legislated powers ?
0
Political corruption
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134885
Organized crime
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
what is political corruption ?
35
legislated powers by government officials for illegitimate private gain
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134886
Organized crime
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
what is not considered political corruption ?
163
repression of political opponents and general police brutality
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134887
Organized crime
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
what are the illegal acts of the government ?
295
private persons or corporations not directly involved with the government
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134888
Organized crime
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
what are some examples of corruption ?
537
bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134889
Organized crime
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
what are some criminal enterprise corruption ?
673
drug trafficking, money laundering, and human trafficking
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134890
Organized crime
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
what is the estimated bribery for bribery ?
1,174
over 1 trillion US dollars annually
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134891
Organized crime
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
what is a state of unrestrained political corruption ?
1,270
kleptocracy
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134894
Organized crime
Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.
human trafficking for the purpose of sexual exploitation is primarily for what ?
126
prostituting women and children into sex industries
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134895
Organized crime
Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.
what does forced prostitution mean ?
490
control over a person who is coerced by another to engage in sexual activity
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134896
Organized crime
Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.
what was the migration of migration in 2001 ?
693
400,000
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134897
Organized crime
Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.
what was unicef estimated in 2001 ?
777
1.75 million
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134899
Organized crime
People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict.
what is people smuggling defined as ?
31
"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134900
Organized crime
People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict.
what is defined by the united nations convention against transnational organized crime ?
354
migrant smuggling
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134901
Organized crime
People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict.
what is the migrant smuggling defined by ?
397
United Nations Convention Against Transnational Organized Crime
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134902
Organized crime
The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.
what is the number of slaves today ?
46
12 million to 27 million
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134903
Organized crime
The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.
where are most debt slaves located ?
206
South Asia
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134904
Organized crime
The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.
what is the fastest growing criminal industry ?
373
outgrow drug trafficking
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134914
Organized crime
The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.
what are the networks characterized by ?
34
a loose system of power relations
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134915
Organized crime
The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.
what is each participant interested in ?
103
furthering his own welfare
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134933
Organized crime
This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations.
what are the periods of political development ?
57
economic or social turmoil or transition
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134934
Organized crime
This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations.
in what year was the revolutions of the soviet union created ?
323
1989
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134935
Organized crime
The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.
what are the newest growth sectors ?
50
identity theft and online extortion
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134936
Organized crime
The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.
why are these activities troubling ?
126
they discourage consumers from using the Internet for e-commerce
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134937
Organized crime
The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.
what was e-commerce supposed to do ?
219
level the playing ground between small and large businesses
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134938
Organized crime
In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.
what does fbi stand for ?
407
Federal Bureau of Investigation
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134939
Organized crime
In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.
what is the name of the senior organized crime in boston ?
623
Gennaro Angiulo
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134955
Organized crime
Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).
what is one of the reasons for the profits of competition ?
51
ensuring criminal monopolies sustain profits
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134956
Organized crime
Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).
what does the restriction of resources do ?
312
controlling the ability to supply or produce to supply
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134964
Organized crime
Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained.
what is the purpose of the subculture ?
330
taking care of their own affairs and rejecting government authority
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134965
Organized crime
Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained.
what are two drug dealers ?
433
thieves and pimps
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for "protection". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a "mafia" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original "Mafia", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish "traditional" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term "oligarchy" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as "[t]he unlawful activities of [...] a highly organized, disciplined association [...]". Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: "Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States." The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the "greatest criminal drug threat to the United States," citing their dominance "over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise." Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home. "Zones of transition" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures "chaotic", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as "bust-out"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at "chop shops" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud ("pump and dump" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to "rough up" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores ("Death to Kidnappers") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to "police" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own "trials" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if "found guilty" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party "criminal organizations". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using "underground banks," as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that "A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed." However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space." Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security." Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term "computer virus" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin."With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín "El Chapo" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms "forced prostitution" or "enforced prostitution" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. "Forced prostitution" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as "...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry were to the pre-industrial world what organized crime is to modern society." If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law." In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a "precarious existence on the fringes of respectable society".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the "stolen livestock from military allured by the profits". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the "polite" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common "objects" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the "polite" society, as well as among criminals. However, there were a few exceptions in which members of the so-called "well-respected" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These "part-time" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually "[drove] him to suicide". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible "for the criminal actions of their clients." Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the criminal world" or "the Napoleon of Crime" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The "disorganized crime" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, "organized" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they "were part of a heterogeneous underworld, a network characterized by complex webs of relationships." OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were "disorganized".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is "...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption." (UN) "A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities." (UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: "OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption."It is a mistake to use the term "OC" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC "shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James "Whitey" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide "Organized Crime" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology
[ "Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated.", "While organized crime is generally thought of as a form of illegal business, some criminal organizations, such as terrorist groups, rebel forces, and separatists, are politically motivated. Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power.", "Many criminal organizations rely on fear or terror to achieve their goals or aims as well as to maintain control within the organization and may adopt tactics commonly used by authoritarian regimes to maintain power. Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms).", "Some forms of organized crime simply exist to cater towards demand of illegal goods in a state or to facilitate trade of goods and services that may have been banned by a state (such as illegal drugs or firearms). Sometimes, criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for \"protection\". Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized.", "Street gangs may often be deemed organized crime groups or, under stricter definitions of organized crime, may become disciplined enough to be considered organized. A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland.", "A criminal organization can also be referred to as an outfit, a gang, crime family, mafia, mob, (crime) ring, or syndicate; the network, subculture, and community of criminals involved in organized crime may be referred to as the underworld or gangland. Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement.", "Sociologists sometimes specifically distinguish a \"mafia\" as a type of organized crime group that specializes in the supply of extra-legal protection and quasi-law enforcement. Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions.", "Academic studies of the original \"Mafia\", the Italian Mafia, which predates the other groups, generated an economic study of organized crime groups and exerted great influence on studies of the Russian mafia, the Chinese Triads, the Hong Kong Triads, and the Japanese Yakuza.Other organizations—including states, churches, militaries, police forces, and corporations—may sometimes use organized-crime methods to conduct their activities, but their powers derive from their status as formal social institutions. There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason.", "There is a tendency to distinguish \"traditional\" organized crime from certain other forms of crime that also usually involve organized or group criminal acts, such as white-collar crime, financial crimes, political crimes, war crimes, state crimes, and treason. This distinction is not always apparent and academics continue to debate the matter.", "This distinction is not always apparent and academics continue to debate the matter. For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other.", "For example, in failed states that can no longer perform basic functions such as education, security, or governance (usually due to fractious violence or to extreme poverty), organized crime, governance, and war sometimes complement each other. The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice.", "The term \"oligarchy\" has been used to describe democratic countries whose political, social, and economic institutions come under the control of a few families and business oligarchs that may be deemed or may devolve into organized crime groups in practice. By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments.", "By their very nature, kleptocracies, mafia states, narco-states or narcokleptocracies, and states with high levels of clientelism and political corruption are either heavily involved with organized crime or tend to foster organized crime within their own governments. In the United States, the Organized Crime Control Act (1970) defines organized crime as \"[t]he unlawful activities of [...] a highly organized, disciplined association [...]\". Criminal activity as a structured process is referred to as racketeering.", "Criminal activity as a structured process is referred to as racketeering. In the UK, police estimate that organized crime involves up to 38,000 people operating in 6,000 various groups. Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades.", "Historically, the largest organized crime force in the United States has been La Cosa Nostra (Italian-American Mafia), but other transnational criminal organizations have also risen in prominence in recent decades. A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities.", "A 2012 article in a U.S. Department of Justice journal stated that: \"Since the end of the Cold War, organized crime groups from Russia, China, Italy, Nigeria, and Japan have increased their international presence and worldwide networks or have become involved in more transnational criminal activities. Most of the world's major international organized crime groups are present in the United States.\"", "Most of the world's major international organized crime groups are present in the United States.\" The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States.", "The US Drug Enforcement Administration's 2017 National Drug Threat Assessment classified Mexican transnational criminal organizations (TCOs) as the \"greatest criminal drug threat to the United States,\" citing their dominance \"over large regions in Mexico used for the cultivation, production, importation, and transportation of illicit drugs\" and identifying the Sinaloa, Jalisco New Generation, Juárez, Gulf, Los Zetas, and Beltrán-Leyva cartels as the six Mexican TCO with the greatest influence in drug trafficking to the United States. The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities.", "The United Nations Sustainable Development Goal 16 has a target to combat all forms of organized crime as part of the 2030 Agenda.In some countries, football hooligans can be considered a criminal organization if it engages in illicit and violent activities. == Models of organized crime == Various models have been proposed to describe the structure of criminal organizations. === Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions.", "=== Organizational === ==== Patron–client networks ==== Patron–client networks are defined by fluid interactions. They produce crime groups that operate as smaller units within the overall network, and as such tend towards valuing significant others, familiarity of social and economic environments, or tradition. These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc.", "These networks are usually composed of: Hierarchies based on 'naturally' forming family, social and cultural traditions; 'Tight-knit' focus of activity/labor; Fraternal or nepotistic value systems; Personalized activity; including family rivalries, territorial disputes, recruitment and training of family members, etc. ; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc.", "; Entrenched belief systems, reliance of tradition (including religion, family values, cultural expectations, class politics, gender roles, etc. ); and, Communication and rule enforcement mechanisms dependent on organizational structure, social etiquette, history of criminal involvement, and collective decision-making. ==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures.", "==== Bureaucratic/corporate operations ==== Bureaucratic/corporate organized crime groups are defined by the general rigidity of their internal structures. They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth.", "They focus more on how the operations works, succeeds, sustains itself or avoids retribution, they are generally typified by: A complex authority structure; An extensive division of labor between classes within the organization; Meritocratic (as opposed to cultural or social attributes); Responsibilities carried out in an impersonal manner; Extensive written rules/regulations (as opposed to cultural praxis dictating action); and, 'Top-down' communication and rule enforcement mechanisms.However, this model of operation has some flaws: The 'top-down' communication strategy is susceptible to interception, more so further down the hierarchy being communicated to; Maintaining written records jeopardizes the security of the organization and relies on increased security measures; Infiltration at lower levels in the hierarchy can jeopardize the entire organization (a 'house of cards' effect); and, Death, injury, incarceration or internal power struggles dramatically heighten the insecurity of operations.While bureaucratic operations emphasize business processes and strongly authoritarian hierarchies, these are based on enforcing power relationships rather than an overlying aim of protectionism, sustainability or growth. ==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010.", "==== Youth and street gangs ==== An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an increase of 35% between 2002 and 2010. A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures.", "A distinctive gang culture underpins many, but not all, organized groups; this may develop through recruiting strategies, social learning processes in the corrective system experienced by youth, family or peer involvement in crime, and the coercive actions of criminal authority figures. The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria.", "The term “street gang” is commonly used interchangeably with “youth gang,” referring to neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\"", "Miller (1992) defines a street gang as “a self-formed association of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively or as individuals to achieve specific purposes, including the conduct of illegal activity and control of a particular territory, facility, or enterprise.\" Some reasons youth join gangs include to feel accepted, attain status, and increase their self-esteem. A sense of unity brings together many of the youth gangs that lack the family aspect at home.", "A sense of unity brings together many of the youth gangs that lack the family aspect at home. \"Zones of transition\" are deteriorating neighborhoods with shifting populations. In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion.", "In such areas, conflict between groups, fighting, \"turf wars\", and theft promote solidarity and cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture.", "Cohen (1955): working class teenagers joined gangs due to frustration of inability to achieve status and goals of the middle class; Cloward and Ohlin (1960): blocked opportunity, but unequal distribution of opportunities lead to creating different types of gangs (that is, some focused on robbery and property theft, some on fighting and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one of the first criminologists to focus on evidence-based practice rather than intuition into gang life and culture. Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later.", "Participation in gang-related events during adolescence perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like Spergel studied the effects on members of social workers’ interventions. More interventions actually lead to greater gang participation and solidarity and bonds between members. Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories.", "Downes and Rock (1988) on Parker's analysis: strain theory applies, labeling theory (from experience with police and courts), control theory (involvement in trouble from early childhood and the eventual decision that the costs outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention.", "No ethnic group is more disposed to gang involvement than another, rather it is the status of being marginalized, alienated or rejected that makes some groups more vulnerable to gang formation, and this would also be accounted for in the effect of social exclusion, especially in terms of recruitment and retention. These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity.", "These may also be defined by age (typically youth) or peer group influences, and the permanence or consistency of their criminal activity. These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos).", "These groups also form their own symbolic identity or public representation which are recognizable by the community at large (include colors, symbols, patches, flags and tattoos). Research has focused on whether the gangs have formal structures, clear hierarchies and leadership in comparison with adult groups, and whether they are rational in pursuit of their goals, though positions on structures, hierarchies and defined roles are conflicting. Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality.", "Some studied street gangs involved in drug dealing - finding that their structure and behavior had a degree of organizational rationality. Members saw themselves as organized criminals; gangs were formal-rational organizations, Strong organizational structures, well defined roles and rules that guided members’ behavior. Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with the two above.", "Padilla (1992) agreed with the two above. Padilla (1992) agreed with the two above. However some have found these to be loose rather than well-defined and lacking persistent focus, there was relatively low cohesion, few shared goals and little organizational structure. Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor.", "Shared norms, value and loyalties were low, structures \"chaotic\", little role differentiation or clear distribution of labor. Similarly, the use of violence does not conform to the principles behind protection rackets, political intimidation and drug trafficking activities employed by those adult groups. In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation.", "In many cases gang members graduate from youth gangs to highly developed OC groups, with some already in contact with such syndicates and through this we see a greater propensity for imitation. Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association.", "Gangs and traditional criminal organizations cannot be universally linked (Decker, 1998), however there are clear benefits to both the adult and youth organization through their association. In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking.", "In terms of structure, no single crime group is archetypal, though in most cases there are well-defined patterns of vertical integration (where criminal groups attempt to control the supply and demand), as is the case in arms, sex and drug trafficking. === Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime.", "=== Individual difference === ==== Entrepreneurial ==== The entrepreneurial model looks at either the individual criminal or a smaller group of organized criminals, that capitalize off the more fluid 'group-association' of contemporary organized crime. This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this.", "This model conforms to social learning theory or differential association in that there are clear associations and interaction between criminals where knowledge may be shared, or values enforced, however, it is argued that rational choice is not represented in this. The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain.", "The choice to commit a certain act, or associate with other organized crime groups, may be seen as much more of an entrepreneurial decision - contributing to the continuation of a criminal enterprise, by maximizing those aspects that protect or support their own individual gain. In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage.", "In this context, the role of risk is also easily understandable, however it is debatable whether the underlying motivation should be seen as true entrepreneurship or entrepreneurship as a product of some social disadvantage. The criminal organization, much in the same way as one would assess pleasure and pain, weighs such factors as legal, social and economic risk to determine potential profit and loss from certain criminal activities. This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work.", "This decision-making process rises from the entrepreneurial efforts of the group's members, their motivations and the environments in which they work. Opportunism is also a key factor – the organized criminal or criminal group is likely to frequently reorder the criminal associations they maintain, the types of crimes they perpetrate, and how they function in the public arena (recruitment, reputation, etc.) in order to ensure efficiency, capitalization and protection of their interests.", "in order to ensure efficiency, capitalization and protection of their interests. === Multi-model approach === Culture and ethnicity provide an environment where trust and communication between criminals can be efficient and secure. This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime.", "This may ultimately lead to a competitive advantage for some groups; however, it is inaccurate to adopt this as the only determinant of classification in organized crime. This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses.", "This categorization includes the Sicilian Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan), Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia, Korean criminal groups and Jamaican posses. From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory).", "From this perspective, organized crime is not a modern phenomenon - the construction of 17th and 18th century crime gangs fulfill all the present day criteria of criminal organizations (in opposition to the Alien Conspiracy Theory). These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering.", "These roamed the rural borderlands of central Europe embarking on many of the same illegal activities associated with today's crime organizations, with the exception of money laundering. When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World.", "When the French revolution created strong nation states, the criminal gangs moved to other poorly controlled regions like the Balkans and Southern Italy, where the seeds were sown for the Sicilian Mafia - the linchpin of organized crime in the New World. === Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data.", "=== Computational approach === While most of the conceptual frameworks used to model organized crime emphasize the role of actors or activities, computational approaches built on the foundations of data science and artificial intelligence are focusing on deriving new insights on organized crime from big data. For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks.", "For example, novel machine learning models have been applied to study and detect urban crime and online prostitution networks. Big data has also been used to develop online tools predicting the risk for an individual to be a victim of online sex trade or getting drawn into online sex work. In addition, data from Twitter and Google Trends have been used to study the public perceptions of organized crime. == Typical activities == Organized crime groups provide a range of illegal services and goods.", "== Typical activities == Organized crime groups provide a range of illegal services and goods. Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading).", "Organized crime often victimizes businesses through the use of extortion or theft and fraud activities like hijacking cargo trucks and ships, robbing goods, committing bankruptcy fraud (also known as \"bust-out\"), insurance fraud or stock fraud (insider trading). Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam).", "Organized crime groups also victimize individuals by car theft (either for dismantling at \"chop shops\" or for export), art theft, Metal theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer hacking, credit card fraud, economic espionage, embezzlement, identity theft, and securities fraud (\"pump and dump\" scam). Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes.", "Some organized crime groups defraud national, state, or local governments by bid rigging public projects, counterfeiting money, smuggling or manufacturing untaxed alcohol (rum-running) or cigarettes (buttlegging), and providing immigrant workers to avoid taxes. Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution.", "Organized crime groups seek out corrupt public officials in executive, law enforcement, and judicial roles so that their criminal rackets and activities on the black market can avoid, or at least receive early warnings about, investigation and prosecution. Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings.", "Activities of organized crime include loansharking of money at very high interest rates, blackmailing, assassination, backyard breeding, bombings, bookmaking and illegal gambling, confidence tricks, forging early release prison documents, copyright infringement, counterfeiting of intellectual property, metal theft, fencing, kidnapping, prostitution, smuggling, drug trafficking, arms trafficking, impersonating armored truck drivers, oil smuggling, antiquities smuggling, organ trafficking, contract killing, identity document forgery, money laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price fixing, cargo theft via fictions pickup, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear materials, military equipment smuggling, nuclear weapons smuggling, passport fraud, providing illegal immigration and cheap labor, people smuggling, trading in endangered species, and trafficking in human beings. Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying.", "Organized crime groups also do a range of business and labor racketeering activities, such as skimming casinos, insider trading, setting up monopolies in industries such as garbage collecting, construction and cement pouring, bid rigging, getting \"no-show\" and \"no-work\" jobs, political corruption and bullying. === Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form.", "=== Violence === ==== Assault ==== The commission of violent crime may form part of a criminal organization's 'tools' used to achieve criminogenic goals (for example, its threatening, authoritative, coercive, terror-inducing, or rebellious role), due to psycho-social factors (cultural conflict, aggression, rebellion against authority, access to illicit substances, counter-cultural dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and the groups they form. Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control.", "Assaults are used for coercive measures, to \"rough up\" debtors, competition or recruits, in the commission of robberies, in connection to other property offenses, and as an expression of counter-cultural authority; violence is normalized within criminal organizations (in direct opposition to mainstream society) and the locations they control. Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults.", "Whilst the intensity of violence is dependent on the types of crime the organization is involved in (as well as their organizational structure or cultural tradition) aggressive acts range on a spectrum from low-grade physical assaults to major trauma assaults. Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors.", "Bodily harm and grievous bodily harm, within the context of organized crime, must be understood as indicators of intense social and cultural conflict, motivations contrary to the security of the public, and other psycho-social factors. ==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition.", "==== Murder ==== Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian mafia which placed large physical and symbolic importance on the act of murder, its purposes and consequences, to a much less discriminate form of expressing power, enforcing criminal authority, achieving retribution or eliminating competition. The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability).", "The role of the hit man has been generally consistent throughout the history of organized crime, whether that be due to the efficiency or expediency of hiring a professional assassin or the need to distance oneself from the commission of murderous acts (making it harder to prove criminal culpability). This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition.", "This may include the assassination of notable figures (public, private or criminal), once again dependent on authority, retribution or competition. Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs.", "Revenge killings, armed robberies, violent disputes over controlled territories and offenses against members of the public must also be considered when looking at the dynamic between different criminal organizations and their (at times) conflicting needs. After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy.", "After killing their victims, the gangsters often try to destroy evidence by getting rid of the victims remains in such a way as to prevent, hinder, or delay the discovery of the body, to prevent identification of the body, or to prevent autopsy. The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine).", "The different ways that organized criminals have been known to dispose of dead bodies include but are not limited to hiding the bodies in trash or landfills, feeding the bodies to animals (such as pigs or rats), destruction by industrial process (such as machinery, chemical bath, molten metal or a junked car), injection into the legitimate body disposal system (such as morgues, funeral homes, cemeteries, crematoriums, funeral pyres or cadaver donations) or covert killings at health care facilities, disguising as animal flesh (such as food waste or restaurant food), creating false evidence of the circumstances of death and letting investigators dispose of the body, possibly obscuring identity, abandonment in a remote area where the body can degrade significantly, while exposure to elements (such as rain, wind, heat, etc) as well as animal activity (such as consumption by scavengers) can contaminate the crime scene and/or destroy evidence before being discovered, if ever, such as a wilderness area (such as national parks or nature reserves) or an abandoned area (such as an abandoned building, well or mine). However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies.", "However, there are also many instances of gangsters putting the bodies of their victims on display as a form of psychological warfare against their enemies. ==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules.", "==== Vigilantism ==== In an ironic twist, criminal syndicates are often known to commit acts of vigilantism by enforcing laws, investigating certain criminal acts and punishing those who violate such rules. People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups.", "People who are often targeted by organized criminals tend to be individualistic criminals, people who committed crimes that are considered particularly heinous by society, people who committed wrongdoings against members or associates, rivals and/or terrorist groups. One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities.", "One reason why criminal groups might commit vigilantism in their neighborhoods is to prevent heavy levels of community policing, that could be harmful to their illicit businesses; additionally the vigilante acts could help the gangs to ingratiate themselves in their communities. During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK.", "During the roaring twenties, the anti-catholic and anti-semitic Ku Klux Klan was known to be staunch enforcers of prohibition, as a result Italian, Irish, Polish, and Jewish mobsters would at times have violent confrontations against the KKK, on one occasion FBI informant and notorious mobster Gregory Scarpa kidnapped and tortured a local Klansmen into revealing the bodies of Civil rights workers who had been killed by the KKK. During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings.", "During World War II, America had a growing number of Nazi supporters that formed the German American Bund, which was known to be threatening to local Jewish people, as a result Jewish mobsters (such a Meyer Lansky, Bugsy Siegel and Jack Ruby) were often hired by the American Jewish community to help defend against the Nazi bund, even going as far as attacking and killing Nazi sympathizers during bund meetings. Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients.", "Vigilante groups such as the Black Panther Party, White Panther Party and Young Lords have been accused of committing crimes in order to fund their political activities.While protection racketeering is often seen as nothing more than extortion, criminal syndicates that participate in protection rackets have at times provided genuine protection against other criminals for their clients, the reason for this is because the criminal organization would want the business of their clients to do better so that the gang can demand even more protection money, additionally if the gang has enough knowledge of the local fencers, they may even be able to track down and retrieve any objects that were stolen from the business owner, to further help their clients the gang may also force out, disrupt, vandalize, steal from or shutdown competing businesses for their clients. In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons.", "In Colombia the insurgent groups were trying to steal land, kidnap family members, and extort money from the drug barons. As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station.", "As a result the drug lords of the Medellín Cartel formed a paramilitary vigilante group known as Muerte a Secuestradores (\"Death to Kidnappers\") to defend the cartel against the FARC and M-19, even kidnapping and torturing the leader of M-19 before leaving him tied up in front of a police station. During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar.", "During the Medellín Cartel's war against the Colombian government, both the Norte del Valle Cartel and Cali Cartel formed and operated a vigilante group called Los Pepes (which also comprised members of the Colombian government, police and former members of the Medellín Cartel) to bring about the downfall of Pablo Escobar; they did so by bombing the properties of the Medellín Cartel and kidnapping, torturing and/or killing Escobar's associates as well as working alongside the Search Bloc, which would eventually lead to the dismantling of the Medellín Cartel and the death of Pablo Escobar. Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters.", "Because of the high levels of corruption, the Oficina de Envigado would do things to help the police and vice versa, to the point where the police and the cartel would sometimes do operations together against other criminals; additionally the leaders of La Oficina would often act as judges to mediate disputes between the various different drug gangs throughout Colombia, which according to some helped prevented a lot of disputes from turning violent.On Somalia coastline many people rely on fishing for economic survival, because of this Somali pirates are often known to attack foreign vessels who partake in illegal fishing and overfishing in their waters and vessels that illegally dump waste into their waters. As a result, marine biologists say that the local fishery is recovering.", "As a result, marine biologists say that the local fishery is recovering. In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons.", "In Mexico a vigilante group called Grupos de autodefensa comunitaria was formed to counter the illegal loggers, the La Familia Michoacana Cartel and a drug cartel/cult known as the Knights Templar Cartel; as they grew, they were being joined by former cartel members and as they got bigger they began to sell drugs in order to buy weapons. The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel.", "The Knights Templar Cartel was eventually defeated and dissolved by the vigilantes' actions but they ended up forming their own cartel called Los Viagras, which has links with the Jalisco New Generation Cartel. The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities.", "The Minuteman Project is a far-right paramilitary organization that seeks to prevent illegal immigration across the US-Mexico border; however, doing so is detrimental to gangs like Mara Salvatrucha, who make money through people smuggling, and as a result MS-13 is known to commit acts of violence against members of the Minutemen, to prevent them from interfering with their illegal immigration activities. Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba.", "Throughout the world there are various anti-gang vigilante groups, who profess to be fighting against gang influence, but share characteristics and acts similarly to gangs, including Sombra Negra, Friends Stand United, People Against Gangsterism and Drugs, and OG Imba. Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers.", "Gangs that are involved in drug trafficking often commit violent acts to stop or force out independent dealers—drug dealers with no gang ties—to keep them from taking customers. In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners.", "In America there is an animal welfare organization called Rescue Ink, in which outlaw biker gang members volunteer to rescue animals in need and combat against people who commit animal cruelty, such as breaking up cockfighting rings, stopping the killing of stray cats, breaking up dog fighting rings, and rescuing pets from abusive owners. In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate.", "In the American prison system, prison gangs are often known to physically harm and even kill inmates who have committed such crimes as child murder, serial killing, pedophilia, hate crimes, domestic violence, and rape, and inmates who have committed crimes against the elderly, animals, the disabled, the poor and the less fortunate. In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors.", "In many minority communities and poor neighborhoods, residents often distrust law enforcement, as a result the gang syndicates often take over to \"police\" their neighborhoods by committing acts against people who had committed crimes such as bullying, muggings, home invasions, hate crimes, stalking, sexual assault, domestic violence and child molestation, as well as mediating disputes between neighbors. The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered.", "The ways that the gangs would punish such individuals could range from forced apologies, being threatened, being forced to return stolen objects, vandalizing property, arson, being forced to move, bombings, being assaulted and/or battered, kidnappings, false imprisonment, torture and/or being murdered. Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense.", "Some criminal syndicates have been known to hold their own \"trials\" for members of theirs who had been accused of wrongdoing; the punishments that the accused member would face if \"found guilty\" would vary depending on the offense. ==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance.", "==== Terrorism ==== In addition to what is considered traditional organized crime involving direct crimes of fraud swindles, scams, racketeering and other acts motivated for the accumulation of monetary gain, there is also non-traditional organized crime which is engaged in for political or ideological gain or acceptance. Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism.", "Such crime groups are often labelled terrorist groups or narcoterrorists.There is no universally agreed, legally binding, criminal law definition of terrorism. Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies.", "Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for a religious, political or ideological goal, deliberately target or disregard the safety of non-combatants (e.g., neutral military personnel or civilians), and are committed by non-government agencies. Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\".", "Some definitions also include acts of unlawful violence and war, especially crimes against humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi Party, its paramilitary and police organizations, and numerous associations subsidiary to the Nazi Party \"criminal organizations\". The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group.", "The use of similar tactics by criminal organizations for protection rackets or to enforce a code of silence is usually not labeled terrorism though these same actions may be labeled terrorism when done by a politically motivated group. Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse.", "Notable groups include the Medellín Cartel, Corleonesi Mafia, various Mexican Cartels, and Jamaican Posse. ==== Other ==== Arms trafficking Metal theft Arson Coercion Extortion Protection racket Sexual assault === Financial crime === Organized crime groups generate large amounts of money by activities such as drug trafficking, arms smuggling, extortion, theft, and financial crime. These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise.", "These illegally sourced assets are of little use to them unless they can disguise it and convert it into funds that are available for investment into legitimate enterprise. The methods they use for converting its ‘dirty’ money into ‘clean’ assets encourages corruption. Organized crime groups need to hide the money's illegal origin. This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets.", "This allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to cover the money trail and convert proceeds of crime into usable assets. Money laundering is bad for international and domestic trade, banking reputations and for effective governments and rule of law. This is due to the methods used to hide the proceeds of crime.", "This is due to the methods used to hide the proceeds of crime. These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds.", "These methods include, but are not limited to: buying easily transported values, transfer pricing, and using \"underground banks,\" as well as infiltrating firms in the legal economy.Launderers will also co-mingle illegal money with revenue made from businesses in order to further mask their illicit funds. Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is.", "Accurate figures for the amounts of criminal proceeds laundered are almost impossible to calculate, rough estimates have been made, but only give a sense of the scale of the problem and not quite how great the problem truly is. The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars.", "The United Nations Office on Drugs and Crime conducted a study, they estimated that in 2009, money laundering equated to about 2.7% of global GDP being laundered; this is equal to about 1.6 trillion US dollars. The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\"", "The Financial Action Task Force on Money Laundering (FATF), an intergovernmental body set up to combat money laundering, has stated that \"A sustained effort between 1996 and 2000 by the Financial Action Task Force (FATF) to produce such estimates failed.\" However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million.", "However, anti-money laundering efforts that seize money laundered assets in 2001 amounted to $386 million. The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens.", "The rapid growth of money laundering is due to: the scale of organized crime precluding it from being a cash business - groups have little option but to convert its proceeds into legitimate funds and do so by investment, by developing legitimate businesses and purchasing property; globalization of communications and commerce - technology has made rapid transfer of funds across international borders much easier, with groups continuously changing techniques to avoid investigation; and, a lack of effective financial regulation in parts of the global economy.Money laundering is a three-stage process: Placement: (also called immersion) groups ‘smurf’ small amounts at a time to avoid suspicion; physical disposal of money by moving crime funds into the legitimate financial system; may involve bank complicity, mixing licit and illicit funds, cash purchases and smuggling currency to safe havens. Layering: disguises the trail to foil pursuit.", "Layering: disguises the trail to foil pursuit. Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves creating false paper trails, converting cash into assets by cash purchases. Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail.", "Integration: (also called ‘spin dry): Making it into clean taxable income by real-estate transactions, sham loans, foreign bank complicity and false import and export transactions.Means of money laundering: Money transmitters, black money markets purchasing goods, gambling, increasing the complexity of the money trail. Underground banking (flying money), involves clandestine ‘bankers’ around the world.", "Underground banking (flying money), involves clandestine ‘bankers’ around the world. It often involves otherwise legitimate banks and professionals.The policy aim in this area is to make the financial markets transparent, and minimize the circulation of criminal money and its cost upon legitimate markets. ==== Counterfeiting ==== Counterfeiting money is another financial crime. The counterfeiting of money includes illegally producing money that is then used to pay for anything desired. In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names.", "In addition to being a financial crime, counterfeiting also involves manufacturing or distributing goods under assumed names. Counterfeiters benefit because consumers believe they are buying goods from companies that they trust, when in reality they are buying low quality counterfeit goods. In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion.", "In 2007, the OECD reported the scope of counterfeit products to include food, pharmaceuticals, pesticides, electrical components, tobacco and even household cleaning products in addition to the usual films, music, literature, games and other electrical appliances, software and fashion. A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale.", "A number of qualitative changes in the trade of counterfeit products: a large increase in fake goods which are dangerous to health and safety; most products repossessed by authorities are now household items rather than luxury goods; a growing number of technological products; and, production is now operated on an industrial scale. ==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation.", "==== Tax evasion ==== The economic effects of organized crime have been approached from a number of both theoretical and empirical positions, however the nature of such activity allows for misrepresentation. The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion.", "The level of taxation taken by a nation-state, rates of unemployment, mean household incomes and level of satisfaction with government and other economic factors all contribute to the likelihood of criminals to participate in tax evasion. As most organized crime is perpetrated in the liminal state between legitimate and illegitimate markets, these economic factors must adjusted to ensure the optimal amount of taxation without promoting the practice of tax evasion. As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized.", "As with any other crime, technological advancements have made the commission of tax evasion easier, faster and more globalized. The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations.", "The ability for organized criminals to operate fraudulent financial accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and operating goods smuggling syndicates to evade importation taxes help ensure financial sustainability, security from law enforcement, general anonymity and the continuation of their operations. === Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.", "=== Cybercrime === ==== Internet fraud ==== Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims.", "Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.", "Internet fraud refers to the actual use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves.", "In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace.", "Email fraud, advance-fee fraud, romance scams, employment scams, and other phishing scams are the most common and most widely used forms of identity theft, though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.", "==== Copyright infringement ==== Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate.", "Whilst almost universally considered under civil procedure, the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.", "More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement. Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime. ==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage.", "==== Cyberwarfare ==== Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.", "It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption. Moreover, it acts as the \"fifth domain of warfare,\" and William J. Lynn, U.S. Deputy Secretary of Defense, states that \"as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.\"", "[which] has become just as critical to military operations as land, sea, air, and space.\" Cyber espionage is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software and/or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making espionage possible internationally.", "Unsecured information may be intercepted and modified, making espionage possible internationally. The recently established Cyber Command is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual \"breaches of national security.\" Furthermore, military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage.", "Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.", "According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. ==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity.", "==== Computer viruses ==== The term \"computer virus\" may be used as an overarching phrase to include all types of true viruses, malware, including computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software (though all are technically unique), and proves to be quite financially lucrative for criminal organizations, offering greater opportunities for fraud and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions).", "Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance.", "Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.", "Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world.", "In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times.", "It is considered \"the first attack on critical industrial infrastructure that sits at the foundation of modern economies,\" notes the New York Times. === White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability).", "=== White-collar crime and corruption === ==== Corporate crime ==== Corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals that may be identified with a corporation or other business entity (see vicarious liability and corporate liability). Corporate crimes are motivated by either the individuals desire or the corporations desire to increase profits. The cost of corporate crimes to United States taxpayers is about $500 billion.", "The cost of corporate crimes to United States taxpayers is about $500 billion. Note that some forms of corporate corruption may not actually be criminal if they are not specifically illegal under a given system of laws. For example, some jurisdictions allow insider trading.", "For example, some jurisdictions allow insider trading. For example, some jurisdictions allow insider trading. The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies.", "The different businesses that organized crime figures have been known to operate is vast, including but not limited to pharmacies, import-export companies, check-cashing stores, tattoo parlors, zoos, online dating sites, liquor stores, motorcycle shops, banks, hotels, ranches and plantations, electronic stores, beauty salons, real estate companies, daycares, framing stores, taxicab companies, phone companies, shopping malls, jewelry stores, modeling agencies, dry cleaners, pawn shops, pool halls, clothing stores, freight companies, charity foundations, youth centers, recording studios, sporting goods stores, furniture stores, gyms, insurance companies, security companies, law firms, and private military companies. ==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit.", "==== Labor racketeering ==== Labor racketeering, as defined by the United States Department of Labor, is the infiltrating, exploiting, and controlling of employee benefit plan, union, employer entity, or workforce that is carried out through illegal, violent, or fraudulent means for profit or personal benefit. Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely.", "Labor racketeering has developed since the 1930s, affecting national and international construction, mining, energy production and transportation sectors immensely. Activity has focused on the importation of cheap or unfree labor, involvement with union and public officials (political corruption), and counterfeiting. ==== Political corruption ==== Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption.", "Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties. Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.", "Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities. The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another.", "For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\".", "A state of unrestrained political corruption is known as a kleptocracy, literally meaning \"rule by thieves\". === Drug trafficking === There are three major regions that center around drug trafficking, known as the Golden Triangle (Burma, Laos, Thailand), Golden Crescent (Afghanistan) and Central and South America. There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin.", "There are suggestions that due to the continuing decline in opium production in South East Asia, traffickers may begin to look to Afghanistan as a source of heroin. \"With respect to organized crime and accelerating synthetic drug production in East and Southeast Asia, especially the Golden Triangle, Sam Gor, also known as The Company, is the most prominent international crime syndicate based in Asia-Pacific. It is made up of members of five different triads. Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop.", "Sam Gor is understood to be headed by Chinese-Canadian Tse Chi Lop. The Cantonese Chinese syndicate is primarily involved in drug trafficking, earning at least $8 billion per year. Sam Gor is alleged to control 40% of the Asia-Pacific methamphetamine market, while also trafficking heroin and ketamine. The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan.", "The organization is active in a variety of countries, including Myanmar, Thailand, New Zealand, Australia, Japan, China and Taiwan. Sam Gor previously produced meth in Southern China and is now believed to manufacture mainly in the Golden Triangle, specifically Shan State, Myanmar, responsible for much of the massive surge of crystal meth in recent years. The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China.", "The group is understood to be headed by Tse Chi Lop, a Chinese-Canadian gangster born in Guangzhou, China. Tse is a former member of the Hong Kong-based crime group, the Big Circle Gang. In 1988, Tse immigrated to Canada. In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars.", "In 1998, Tse was convicted of transporting heroin into the United States and served nine years behind bars. Tse has been compared in prominence to Joaquín \"El Chapo\" Guzmán and Pablo Escobar.The U.S. supply of heroin comes mainly from foreign sources which include Southeast Asia's Golden Triangle, Southwest Asia, and Latin America. Heroin comes in two forms. The first is its chemical base form which presents itself as brown and the second is a salt form that is white.", "The first is its chemical base form which presents itself as brown and the second is a salt form that is white. The former is mainly produced in Afghanistan and some south-west countries while the latter had a history of being produced in only south-east Asia, but has since moved to also being produced in Afghanistan. There is some suspicion white Heroin is also being produced in Iran and Pakistan, but it is not confirmed. This area of Heroin production is referred to as the Golden Crescent.", "This area of Heroin production is referred to as the Golden Crescent. Heroin is not the only drug being used in these areas. The European market has shown signs of growing use in opioids on top of the long-term heroin use.Drug traffickers produce drugs in drug laboratories and drug farms. A drug lab can range in size from small workshops to the size of small towns (such as Tranquilandia). A drug farm is a place where drug crops are grown before being made into illegal narcotics.", "A drug farm is a place where drug crops are grown before being made into illegal narcotics. A drug farm can range in size from smallholdings to large plantations. In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops.", "In addition to drug crops, it's also not uncommon for drug farms to also host livestock, both to have a legal source of revenue to help disguise the dirty money and so that the livestock can provide a source of organic fertilizer (such as manure) for the drug crops. Their are multiple instances where traffickers set up some of their drug farms, safe houses and drug labs in remote wilderness areas. Once produced, the fully processed narcotics are then transported to more populated areas to be sold.", "Once produced, the fully processed narcotics are then transported to more populated areas to be sold. Often times the traffickers stationed in these remote criminal settlements, sustain themselves with a combination of survival skills and with food, supplies and workers being brought to them by associates. The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover.", "The reason that traffickers have been known to establish such remote compounds is so that the surrounding area can help to provide varying degrees of natural cover. Additionally the traffickers may also hope, that the surrounding terrain and local wildlife might serve to deter and/or impede either investigative authorities or rival gangs, if the location of the clandestine compound were revealed. While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well.", "While usually thought of as an urban issue, drug trafficking is also known to be a problem in both suburban and rural areas as well. === Human trafficking === ==== Sex trafficking ==== Human trafficking for the purpose of sexual exploitation is a major cause of contemporary sexual slavery and is primarily for prostituting women and children into sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.", "Sexual slavery encompasses most, if not all, forms of forced prostitution. The terms \"forced prostitution\" or \"enforced prostitution\" appear in international and humanitarian conventions but have been insufficiently understood and inconsistently applied. \"Forced prostitution\" generally refers to conditions of control over a person who is coerced by another to engage in sexual activity. Official numbers of individuals in sexual slavery worldwide vary. In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million.", "In 2001 International Organization for Migration estimated 400,000, the Federal Bureau of Investigation estimated 700,000 and UNICEF estimated 1.75 million. The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC.", "The most common destinations for victims of human trafficking are Thailand, Japan, Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a report by UNODC. ==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\".", "==== Illegal immigration and people smuggling ==== People smuggling is defined as \"the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries laws, either clandestinely or through deception, such as the use of fraudulent documents\". The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\".", "The term is understood as and often used interchangeably with migrant smuggling, which is defined by the United Nations Convention Against Transnational Organized Crime as \"...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national\". This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world.", "This practice has increased over the past few decades and today now accounts for a significant portion of illegal immigration in countries around the world. People smuggling generally takes place with the consent of the person or persons being smuggled, and common reasons for individuals seeking to be smuggled include employment and economic opportunity, personal and/or familial betterment, and escape from persecution or conflict. ==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million.", "==== Contemporary slavery and forced labor ==== The number of slaves today remains as high as 12 million to 27 million. This is probably the smallest proportion of slaves to the rest of the world's population in history. Most are debt slaves, largely in South Asia, who are under debt bondage incurred by lenders, sometimes even for generations. It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking.", "It is the fastest growing criminal industry and is predicted to eventually outgrow drug trafficking. == Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places).", "== Historical origins == === Pre-nineteenth century === Today, crime is sometimes thought of as an urban phenomenon, but for most of human history it was the rural interfaces that encountered the majority of crimes (bearing in mind the fact that for most of human history, rural areas were the vast majority of inhabited places). For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer.", "For the most part, within a village, members kept crime at very low rates; however, outsiders such as pirates, highwaymen and bandits attacked trade routes and roads, at times severely disrupting commerce, raising costs, insurance rates and prices to the consumer. According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\"", "According to criminologist Paul Lunde, \"Piracy and banditry were to the pre-industrial world what organized crime is to modern society.\" If we take a global rather than a strictly domestic view, it becomes evident that even crime of the organized kind has a long if not a necessarily noble heritage. The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging.", "The word 'thug' dates back to early 13th-century India, when Thugs, or gangs of criminals, roamed from town to town, looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations.", "Smuggling and drug-trafficking rings are as old as the hills in Asia and Africa, and extant criminal organizations in Italy and Japan trace their histories back several centuries... As Lunde states, \"Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or Mongols are not normally thought of as organized crime groups, yet they share many features associated with thriving criminal organizations. They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\"", "They were for the most part non-ideological, predominantly ethnically based, used violence and intimidation, and adhered to their own codes of law.\" In Ancient Rome, there was an infamous outlaw called Bulla Felix who organized and led a gang of up to six hundred bandits. Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime.", "Terrorism is linked to organized crime, but has political aims rather than solely financial ones, so there is overlap but separation between terrorism and organized crime. ==== Fencing in Ming and Qing China ==== A fence or receiver (銷贓者), was a merchant who bought and sold stolen goods. Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China.", "Fences were part of the extensive network of accomplices in the criminal underground of Ming and Qing China. Their occupation entailed criminal activity, but as fences often acted as liaisons between the more respectable community to the underground criminals, they were seen as living a \"precarious existence on the fringes of respectable society\".A fence worked alongside bandits, but in a different line of work. The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences.", "The network of criminal accomplices that was often acquired was essential to ensuring both the safety and the success of fences. The path into the occupation of a fence stemmed, in a large degree, from necessity. As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village.", "As most fences came from the ranks of poorer people, they often took whatever work they could – both legal and illegal.Like most bandits operated within their own community, fences also worked within their own town or village. For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\".", "For example, in some satellite areas of the capital, military troops lived within or close to the commoner population and they had the opportunity to hold illegal trades with commoners.In areas like Baoding and Hejian, local peasants and community members not only purchased military livestock such as horses and cattle, but also helped to hide the \"stolen livestock from military allured by the profits\". Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers.", "Local peasants and community members became fences and they hid criminal activities from officials in return for products or money from these soldiers. ===== Types of fences ===== Most fences were not individuals who only bought and sold stolen goods to make a living. The majority of fences had other occupations within the \"polite\" society and held a variety of official occupations. These occupations included laborers, coolies, and peddlers.", "These occupations included laborers, coolies, and peddlers. These occupations included laborers, coolies, and peddlers. Such individuals often encountered criminals in markets in their line of work, and, recognizing a potential avenue for an extra source of income, formed acquaintances and temporary associations for mutual aid and protection with criminals. In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils.", "In one example, an owner of a tea house overheard the conversation between Deng Yawen, a criminal and others planning a robbery and he offered to help to sell the loot for an exchange of spoils. At times, the robbers themselves filled the role of fences, selling to people they met on the road. This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils.", "This may actually have been preferable for robbers in certain circumstances, because they would not have to pay the fence a portion of the spoils. Butchers were also prime receivers for stolen animals because of the simple fact that owners could no longer recognize their livestock once butchers slaughtered them. Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences.", "Animals were very valuable commodities within Ming China and a robber could potentially sustain a living from stealing livestock and selling them to butcher-fences. Although the vast majority of the time, fences worked with physical stolen property, fences who also worked as itinerant barbers also sold information as a good. Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob.", "Itinerant barbers often amassed important sources of information and news as they traveled, and sold significant pieces of information, often to criminals in search of places to hide or individuals to rob. In this way, itinerant barbers also served the role as a keeper of information that could be sold to both members of the criminal underground, as well as powerful clients in performing the function of a spy. Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped.", "Fences not only sold items such as jewelry and clothing but was also involved in trafficking hostages that bandits had kidnapped. Women and children were the easiest and among the most common \"objects\" the fences sold. Most of the female hostages were sold to fences and then sold as prostitutes, wives or concubines. One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives.", "One example of human trafficking can be seen from Chen Akuei's gang who abducted a servant girl and sold her to Lin Baimao, who in turn sold her for thirty parts of silver as wives. In contrast to women, who required beauty to sell for a high price, children were sold regardless of their physical appearance or family background. Children were often sold as servants or entertainers, while young girls were often sold as prostitutes.", "Children were often sold as servants or entertainers, while young girls were often sold as prostitutes. ===== Network of connections ===== Like merchants of honest goods, one of the most significant tools of a fence was their network of connections. As they were the middlemen between robbers and clients, fences needed to form and maintain connections in both the \"polite\" society, as well as among criminals. However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers.", "However, there were a few exceptions in which members of the so-called \"well-respected\" society became receivers and harborers. They not only help bandits to sell the stolen goods but also acted as agents of bandits to collect protection money from local merchants and residents. These \"part-time\" fences with high social status used their connection with bandits to help themselves gain social capital as well as wealth. It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients.", "It was extremely important to their occupation that fences maintained a positive relationship with their customers, especially their richer gentry clients. When some members of the local elites joined the ranks of fences, they not only protect bandits to protect their business interests, they actively took down any potential threats to their illegal profiting, even government officials. In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\".", "In the Zhejiang Province, the local elites not only got the provincial commissioner, Zhu Wan, dismissed from his office but also eventually \"[drove] him to suicide\". This was possible because fences often had legal means of making a living, as well as illegal activities and could threaten to turn in bandits to the authorities.It was also essential for them to maintain a relationship with bandits. However, it was just as true that bandits needed fences to make a living.", "However, it was just as true that bandits needed fences to make a living. As a result, fences often held dominance in their relationship with bandits and fences could exploit their position, cheating the bandits by manipulating the prices they paid bandits for the stolen property. ===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China.", "===== Safe houses ===== Aside from simply buying and selling stolen goods, fences often played additional roles in the criminal underground of early China. Because of the high floating population in public places such as inns and tea houses, they often became ideal places for bandits and gangs to gather to exchange information and plan for their next crime. Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers.", "Harborers, people who provided safe houses for criminals, often played the role of receiving stolen goods from their harbored criminals to sell to other customers. Safe houses included inns, tea houses, brothels, opium dens, as well as gambling parlors and employees or owners of such institutions often functioned as harborers, as well as fences. These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds.", "These safe houses locate in places where there are high floating population and people from all kinds of social backgrounds. Brothels themselves helped these bandits to hide and sell stolen goods because of the special Ming Law that exempted brothels from being held responsible \"for the criminal actions of their clients.\" Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs.", "Even though the government required owners of these places to report any suspicious activities, lack of enforcement from the government itself and some of the owners being fences for the bandits made an ideal safe house for bandits and gangs. Pawnshops were also often affiliated with fencing stolen goods. The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit.", "The owners or employees of such shops often paid cash for stolen goods at a price a great deal below market value to bandits, who were often desperate for money, and resold the goods to earn a profit. ===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen.", "===== Punishments for fences ===== Two different Ming Laws, the Da Ming Lü 大明律 and the Da Gao 大诰, drafted by the Hongwu Emperor Zhu Yuanzhang, sentenced fences with different penalties based on the categories and prices of the products that were stolen. In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era.", "In coastal regions, illegal trading with foreigners, as well as smuggling, became a huge concern for the government during the middle to late Ming era. In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment.", "In order to prohibit this crime, the government passed a law in which illegal smugglers who traded with foreigners without the consent of the government would be punished with exile to the border for military service.In areas where military troops were stationed, stealing and selling military property would result in a more severe punishment. In the Jiaqing time, a case was recorded of stealing and selling military horses.", "In the Jiaqing time, a case was recorded of stealing and selling military horses. The emperor himself gave direction that the thieves who stole the horses and the people who helped to sell the horses would be put on cangue and sent to labor in a border military camp.In the salt mines, the penalty for workers who stole salt and people who sold the stolen salt was the most severe. Anyone who was arrested and found guilty of stealing and selling government salt was put to death.", "Anyone who was arrested and found guilty of stealing and selling government salt was put to death. === Nineteenth century === During the Victorian era, criminals and gangs started to form organizations which would collectively become London's criminal underworld. Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes.", "Criminal societies in the underworld started to develop their own ranks and groups which were sometimes called families and were often made up of lower-classes and operated on pick-pocketry, prostitution, forgery and counterfeiting, commercial burglary and even money laundering schemes. Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders.", "Unique also were the use of slang and argots used by Victorian criminal societies to distinguish each other, like those propagated by street gangs like the Peaky Blinders. One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch.", "One of the most infamous crime bosses in the Victorian underworld was Adam Worth, who was nicknamed \"the Napoleon of the criminal world\" or \"the Napoleon of Crime\" and became the inspiration behind the popular character of Professor Moriarty.Organized crime in the United States first came to prominence in the Old West and historians such as Brian J. Robb and Erin H. Turner traced the first organized crime syndicates to the Coschise Cowboy Gang and the Wild Bunch. The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries.", "The Cochise Cowboys, though loosely organized, were unique for their criminal operations in the Mexican border, in which they would steal and sell cattle as well smuggled contraband goods in between the countries. In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang.", "In the Old west there were other examples of gangs that operated in ways similar to an organized crime syndicate such as the Innocents gang, the Jim Miller gang, the Soapy Smith gang, the Belle Starr gang and the Bob Dozier gang. === Twentieth century === Donald Cressey's Cosa Nostra model studied Mafia families exclusively and this limits his broader findings. Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability.", "Structures are formal and rational with allocated tasks, limits on entrance, and influence on the rules established for organizational maintenance and sustainability. In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods.", "In this context there is a difference between organized and professional crime; there is well-defined hierarchy of roles for leaders and members, underlying rules and specific goals that determine their behavior and these are formed as a social system, one that was rationally designed to maximize profits and to provide forbidden goods. Albini saw organized criminal behavior as consisting of networks of patrons and clients, rather than rational hierarchies or secret societies.The networks are characterized by a loose system of power relations. Each participant is interested in furthering his own welfare.", "Each participant is interested in furthering his own welfare. Each participant is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and they exchange information with their clients in order to obtain their support. Clients include members of gangs, local and national politicians, government officials and people engaged in legitimate business. People in the network may not directly be part of the core criminal organization.", "People in the network may not directly be part of the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group.", "Furthering the approach of both Cressey and Albini, Ianni and Ianni studied Italian-American crime syndicates in New York and other cities.Kinship is seen as the basis of organized crime rather than the structures Cressey had identified; this includes fictive godparental and affinitive ties as well as those based on blood relations and it is the impersonal actions, not the status or affiliations of their members, that define the group. Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality.", "Rules of conduct and behavioral aspects of power and networks and roles include the following: family operates as a social unit, with social and business functions merged; leadership positions down to middle management are kinship based; the higher the position, the closer the kinship relationship; group assigns leadership positions to a central group of family members, including fictive god-parental relationship reinforcement; the leadership group are assigned to legal or illegal enterprises, but not both; and, transfer of money, from legal and illegal business, and back to illegal business is by individuals, not companies.Strong family ties are derived from the traditions of southern Italy, where family rather than the church or state is the basis of social order and morality. ==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all.", "==== The \"disorganized crime\" and choice theses ==== One of the most important trends to emerge in criminological thinking about OC in recent years is the suggestion that it is not, in a formal sense, \"organized\" at all. Evidence includes lack of centralized control, absence of formal lines of communication, fragmented organizational structure. It is distinctively disorganized. For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers.", "For example, Seattle's crime network in the 1970s and 80s consisted of groups of businessmen, politicians and of law enforcement officers. They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives.", "They all had links to a national network via Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone else exercised centralized control over them.While some crime involved well-known criminal hierarchies in the city, criminal activity was not subject to central management by these hierarchies nor by other controlling groups, nor were activities limited to a finite number of objectives. The networks of criminals involved with the crimes did not exhibit organizational cohesion. Too much emphasis had been placed on the Mafia as controlling OC.", "Too much emphasis had been placed on the Mafia as controlling OC. The Mafia were certainly powerful but they \"were part of a heterogeneous underworld, a network characterized by complex webs of relationships.\" OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures.", "OC groups were violent and aimed at making money but because of the lack of structure and fragmentation of objectives, they were \"disorganized\".Further studies showed neither bureaucracy nor kinship groups are the primary structure of organized crime; rather, the primary structures were found to lie in partnerships or a series of joint business ventures. Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied.", "Despite these conclusions, all researchers observed a degree of managerial activities among the groups they studied. All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure.", "All observed networks and a degree of persistence, and there may be utility in focusing on the identification of organizing roles of people and events rather than the group's structure. There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end.", "There may be three main approaches to understand the organizations in terms of their roles as social systems: organizations as rational systems: Highly formalized structures in terms of bureaucracy's and hierarchy, with formal systems of rules regarding authority and highly specific goals; organizations as natural systems: Participants may regard the organization as an end in itself, not merely a means to some other end. Promoting group values to maintain solidarity is high on the agenda. They do not rely on profit maximization.", "They do not rely on profit maximization. They do not rely on profit maximization. Their perversity and violence in respect of relationships is often remarkable, but they are characterized by their focus on the connections between their members, their associates and their victims; and, organizations open systems: High levels of interdependence between themselves and the environment in which they operate. There is no one way in which they are organized or how they operate.", "There is no one way in which they are organized or how they operate. They are adaptable and change to meet the demands of their changing environments and circumstances.Organized crime groups may be a combination of all three. ==== International governance approach ==== International consensus on defining organized crime has become important since the 1970s due to its increased prevalence and impact. e.g., UN in 1976 and EU 1998.", "e.g., UN in 1976 and EU 1998. e.g., UN in 1976 and EU 1998. OC is \"...the large scale and complex criminal activity carried on by groups of persons, however loosely or tightly organized for the enrichment of those participating at the expense of the community and its members. It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\"", "It is frequently accomplished through ruthless disregard of any law, including offenses against the person and frequently in connection with political corruption.\" (UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\"", "(UN) \"A criminal organization shall mean a lasting, structured association of two or more persons, acting in concert with a view to committing crimes or other offenses which are punishable by deprivation of liberty or a detention order of a maximum of at least four years or a more serious penalty, whether such crimes or offenses are an end in themselves or a means of obtaining material benefits and, if necessary, of improperly influencing the operation of public authorities.\" (UE) Not all groups exhibit the same characteristics of structure.", "(UE) Not all groups exhibit the same characteristics of structure. However, violence and corruption and the pursuit of multiple enterprises and continuity serve to form the essence of OC activity.There are eleven characteristics from the European Commission and Europol pertinent to a working definition of organized crime. Six of those must be satisfied and the four in italics are mandatory.", "Six of those must be satisfied and the four in italics are mandatory. Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements.", "Summarized, they are: more than two people; their own appointed tasks; activity over a prolonged or indefinite period of time; the use discipline or control; perpetration of serious criminal offenses; operations on an international or transnational level; the use violence or other intimidation; the use of commercial or businesslike structures; engagement in money laundering; exertion of influence on politics, media, public administration, judicial authorities or the economy; and, motivated by the pursuit of profit and/or power,with the Convention against Transnational Organized Crime (the Palermo Convention) having a similar definition: organized criminal: structured group, three or more people, one or more serious crimes, in order to obtain financial or other material benefit; serious crime: offense punishable by at least four years in prison; and, structured group: Not randomly formed but doesn't need formal structure,Others stress the importance of power, profit and perpetuity, defining organized criminal behavior as: nonideological: i.e., profit driven; hierarchical: few elites and many operatives; limited or exclusive membership: maintain secrecy and loyalty of members; perpetuating itself: Recruitment process and policy; willing to use illegal violence and bribery; specialized division of labor: to achieve organization goal; monopolistic: Market control to maximize profits; and, has explicit rules and regulations: Codes of honor.Definitions need to bring together its legal and social elements. OC has widespread social, political and economic effects.", "OC has widespread social, political and economic effects. OC has widespread social, political and economic effects. It uses violence and corruption to achieve its ends: \"OC when group primarily focused on illegal profits systematically commit crimes that adversely affect society and are capable of successfully shielding their activities, in particular by being willing to use physical violence or eliminate individuals by way of corruption. \"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon.", "\"It is a mistake to use the term \"OC\" as though it denotes a clear and well-defined phenomenon. The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\"", "The evidence regarding OC \"shows a less well-organized, very diversified landscape of organizing criminals…the economic activities of these organizing criminals can be better described from the viewpoint of 'crime enterprises' than from a conceptually unclear frameworks such as 'OC'.\" Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places.", "Many of the definitions emphasize the ‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption to achieve its goals and its extra-jurisdictional character...OC may appear in many forms at different times and in different places. Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer.", "Due to the variety of definitions, there is “evident danger” in asking “what is OC?” and expecting a simple answer. ==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide).", "==== The locus of power and organized crime ==== Some espouse that all organized crime operates at an international level, though there is currently no international court capable of trying offenses resulting from such activities (the International Criminal Court's remit extends only to dealing with people accused of offenses against humanity, e.g., genocide). If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many.", "If a network operates primarily from one jurisdiction and carries out its illicit operations there and in some other jurisdictions it is ‘international,' though it may be appropriate to use the term ‘transnational’ only to label the activities of a major crime group that is centered in no one jurisdiction but operating in many. The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory.", "The understanding of organized crime has therefore progressed to combined internationalization and an understanding of social conflict into one of power, control, efficiency risk and utility, all within the context of organizational theory. The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization.", "The accumulation of social, economic and political power have sustained themselves as a core concerns of all criminal organizations: social: criminal groups seek to develop social control in relation to particular communities; economic: seek to exert influence by means of corruption and by coercion of legitimate and illegitimate praxis; and, political: criminal groups use corruption and violence to attain power and status.Contemporary organized crime may be very different from traditional Mafia style, particularly in terms of the distribution and centralization of power, authority structures and the concept of 'control' over one's territory and organization. There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups.", "There is a tendency away from centralization of power and reliance upon family ties towards a fragmentation of structures and informality of relationships in crime groups. Organized crime most typically flourishes when a central government and civil society is disorganized, weak, absent or untrustworthy. This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law.", "This may occur in a society facing periods of political, economic or social turmoil or transition, such as a change of government or a period of rapid economic development, particularly if the society lacks strong and established institutions and the rule of law. The dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that saw the downfall of the Communist Bloc created a breeding ground for criminal organizations. The newest growth sectors for organized crime are identity theft and online extortion.", "The newest growth sectors for organized crime are identity theft and online extortion. These activities are troubling because they discourage consumers from using the Internet for e-commerce. E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security.", "E-commerce was supposed to level the playing ground between small and large businesses, but the growth of online organized crime is leading to the opposite effect; large businesses are able to afford more bandwidth (to resist denial-of-service attacks) and superior security. Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection.", "Furthermore, organized crime using the Internet is much harder to trace down for the police (even though they increasingly deploy cybercops) since most police forces and law enforcement agencies operate within a local or national jurisdiction while the Internet makes it easier for criminal organizations to operate across such boundaries without detection. In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other.", "In the past criminal organizations have naturally limited themselves by their need to expand, putting them in competition with each other. This competition, often leading to violence, uses valuable resources such as manpower (either killed or sent to prison), equipment and finances. In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI).", "In the United States, James \"Whitey\" Bulger, the Irish Mob boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of Investigation (FBI). He used this position to eliminate competition and consolidate power within the city of Boston which led to the imprisonment of several senior organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime family. Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.", "Infighting sometimes occurs within an organization, such as the Castellamarese war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s. Today criminal organizations are increasingly working together, realizing that it is better to work in cooperation rather than in competition with each other (once again, consolidating power). This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca.", "This has led to the rise of global criminal organizations such as Mara Salvatrucha, 18th Street gang and Barrio Azteca. The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs.", "The American Mafia, in addition to having links with organized crime groups in Italy such as the Camorra, the 'Ndrangheta, Sacra Corona Unita and Sicilian Mafia, has at various times done business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza, Indian mafia, the Russian mafia, Thief in law and Post-Soviet Organized crime groups, the Chinese Triads, Chinese Tongs and Asian street gangs, Motorcycle Gangs and numerous White, Black and Hispanic prison and street gangs. The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together.", "The United Nations Office on Drugs and Crime estimated that organized crime groups held $322 billion in assets in 2005.This rise in cooperation between criminal organizations has meant that law enforcement agencies are increasingly having to work together. The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies.", "The FBI operates an organized crime section from its headquarters in Washington, D.C. and is known to work with other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB) and the Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms and Explosives, Drug Enforcement Administration, United States Marshals Service, Immigration and Customs Enforcement, United States Secret Service, US Diplomatic Security Service, United States Postal Inspection Service, U.S. Customs and Border Protection, United States Border Patrol, and the United States Coast Guard), state (e.g., Massachusetts State Police Special Investigation Unit, New Jersey State Police organized crime unit, Pennsylvania State Police organized crime unit and the New York State Police Bureau of Criminal Investigation) and city (e.g., New York City Police Department Organized Crime Unit, Philadelphia Police Department Organized crime unit, Chicago Police Organized Crime Unit and the Los Angeles Police Department Special Operations Division) law enforcement agencies. == Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior.", "== Academic analysis == === Criminal psychology === Criminal psychology is defined as the study of the intentions, behaviors, and actions of a criminal or someone who allows themselves to participate in criminal behavior. The goal is understand what is going on in the criminal's head and explain why they are doing what they are doing. This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves.", "This varies depending on whether the person is facing the punishment for what they did, are roaming free, or if they are punishing themselves. Criminal psychologists get called to court to explain the inside the mind of the criminal. ==== Rational choice ==== This theory treats all individuals as rational operators, committing criminal acts after consideration of all associated risks (detection and punishment) compared with the rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’ emotional state.", "Little emphasis is placed on the offenders’ emotional state. The role of criminal organizations in lowering the perceptions of risk and increasing the likelihood of personal benefit is prioritized by this approach, with the organizations structure, purpose, and activity being indicative of the rational choices made by criminals and their organizers. ==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks.", "==== Deterrence ==== This theory sees criminal behavior as reflective of an individual, internal calculation by the criminal that the benefits associated with offending (whether financial or otherwise) outweigh the perceived risks. The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response.", "The perceived strength, importance or infallibility of the criminal organization is directly proportional to the types of crime committed, their intensity and arguably the level of community response. The benefits of participating in organized crime (higher financial rewards, greater socioeconomic control and influence, protection of the family or significant others, perceived freedoms from 'oppressive' laws or norms) contribute greatly to the psychology behind highly organized group offending. ==== Social learning ==== Criminals learn through associations with one another.", "==== Social learning ==== Criminals learn through associations with one another. The success of organized crime groups is therefore dependent upon the strength of their communication and the enforcement of their value systems, the recruitment and training processes employed to sustain, build or fill gaps in criminal operations. An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime.", "An understanding of this theory sees close associations between criminals, imitation of superiors, and understanding of value systems, processes and authority as the main drivers behind organized crime. Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending.", "Interpersonal relationships define the motivations the individual develops, with the effect of family or peer criminal activity being a strong predictor of inter-generational offending. This theory also developed to include the strengths and weaknesses of reinforcement, which in the context of continuing criminal enterprises may be used to help understand propensities for certain crimes or victims, level of integration into the mainstream culture and likelihood of recidivism / success in rehabilitation. ==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied.", "==== Enterprise ==== Under this theory, organized crime exists because legitimate markets leave many customers and potential customers unsatisfied. High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services.", "High demand for a particular good or service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high profits lead to a conducive environment for entrepreneurial criminal groups to enter the market and profit by supplying those goods and services. For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits.", "For success, there must be: an identified market; and, a certain rate of consumption (demand) to maintain profit and outweigh perceived risks.Under these conditions competition is discouraged, ensuring criminal monopolies sustain profits. Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply).", "Legal substitution of goods or services may (by increasing competition) force the dynamic of organized criminal operations to adjust, as will deterrence measures (reducing demand), and the restriction of resources (controlling the ability to supply or produce to supply). ==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society.", "==== Differential association ==== Sutherland goes further to say that deviancy is contingent on conflicting groups within society, and that such groups struggle over the means to define what is criminal or deviant within society. Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable.", "Criminal organizations therefore gravitate around illegal avenues of production, profit-making, protectionism or social control and attempt (by increasing their operations or membership) to make these acceptable. This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism').", "This also explains the propensity of criminal organizations to develop protection rackets, to coerce through the use of violence, aggression and threatening behavior (at times termed 'terrorism'). Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both).", "Preoccupation with methods of accumulating profit highlight the lack of legitimate means to achieve economic or social advantage, as does the organization of white-collar crime or political corruption (though it is debatable whether these are based on wealth, power or both). The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory.", "The ability to effect social norms and practices through political and economic influence (and the enforcement or normalization of criminogenic needs) may be defined by differential association theory. === Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime.", "=== Critical criminology and sociology === ==== Social disorganization ==== Social disorganization theory is intended to be applied to neighborhood level street crime, thus the context of gang activity, loosely formed criminal associations or networks, socioeconomic demographic impacts, legitimate access to public resources, employment or education, and mobility give it relevance to organized crime. Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration.", "Where the upper- and lower-classes live in close proximity this can result in feelings of anger, hostility, social injustice and frustration. Criminals experience poverty; and witness affluence they are deprived of and which is virtually impossible for them to attain through conventional means. The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form.", "The concept of neighborhood is central to this theory, as it defines the social learning, locus of control, cultural influences and access to social opportunity experienced by criminals and the groups they form. Fear of or lack of trust in mainstream authority may also be a key contributor to social disorganization; organized crime groups replicate such figures and thus ensure control over the counter-culture. This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization.", "This theory has tended to view violent or antisocial behavior by gangs as reflective of their social disorganization rather than as a product or tool of their organization. ==== Anomie ==== Sociologist Robert K. Merton believed deviance depended on society's definition of success, and the desires of individuals to achieve success through socially defined avenues. Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled.", "Criminality becomes attractive when expectations of being able to fulfill goals (therefore achieving success) by legitimate means cannot be fulfilled. Criminal organizations capitalize on states with a lack of norm by imposing criminogenic needs and illicit avenues to achieve them. This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations.", "This has been used as the basis for numerous meta-theories of organized crime through its integration of social learning, cultural deviance, and criminogenic motivations. If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches.", "If crime is seen as a function of anomie, organized behavior produces stability, increases protection or security, and may be directly proportional to market forces as expressed by entrepreneurship- or risk-based approaches. It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society).", "It is the inadequate supply of legitimate opportunities that constrains the ability for the individual to pursue valued societal goals and reduces the likelihood that using legitimate opportunities will enable them to satisfy such goals (due to their position in society). ==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based.", "==== Cultural deviance ==== Criminals violate the law because they belong to a unique subculture - the counter-culture - their values and norms conflicting with those of the working-, middle- or upper-classes upon which criminal laws are based. This subculture shares an alternative lifestyle, language and culture, and is generally typified by being tough, taking care of their own affairs and rejecting government authority. Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities.", "Role models include drug dealers, thieves and pimps, as they have achieved success and wealth not otherwise available through socially-provided opportunities. It is through modeling organized crime as a counter-cultural avenue to success that such organizations are sustained. ==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society.", "==== Alien conspiracy/queer ladder of mobility ==== The alien conspiracy theory and queer ladder of mobility theories state that ethnicity and 'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and their influences are thought to dictate the prevalence of organized crime in society. The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families.", "The alien theory posits that the contemporary structures of organized crime gained prominence during the 1860s in Sicily and that elements of the Sicilian population are responsible for the foundation of most European and North American organized crime, made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic.", "Bell's theory of the 'queer ladder of mobility' hypothesized that 'ethnic succession' (the attainment of power and control by one more marginalized ethnic group over other less marginalized groups) occurs by promoting the perpetration of criminal activities within a disenfranchised or oppressed demographic. Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) .", "Whilst early organized crime was dominated by the Irish Mob (early 1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia, the Aryan Brotherhood (1960s onward), Colombian Medellín Cartel and Cali cartel (mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s onward), Mexican Los Zetas (late 1990s to onward), the Russian Mafia (1988 onward), terrorism-related organized crime Al-Qaeda (1988 onward), the Taliban (1994 onward), and Islamic State of Iraq and the Levant (ISIL) (2010s to onward) . Many argue this misinterprets and overstates the role of ethnicity in organized crime.", "Many argue this misinterprets and overstates the role of ethnicity in organized crime. A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption.", "A contradiction of this theory is that syndicates had developed long before large-scale Sicilian immigration in the 1860s, with these immigrants merely joining a widespread phenomenon of crime and corruption. == Legislative frameworks and policing measures == InternationalConvention against Transnational Organized Crime (the 'Palermo Convention') - the international treaty against organized crime; includes the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and AirCanadaCriminal Code, RSC 1985, c C-46, ss 467.1 to 467.2 Archived 2015-10-05 at the Wayback Machine.ChinaAnti-Organized Crime Law of the People's Republic of ChinaIndiaMaharashtra Control of Organized Crime ActRepublic of IrelandCriminal Assets BureauItalyArticle 41-bis prison regimeUnited KingdomSerious Organized Crime and Police Act 2005United StatesFederal Anti-Racketeering Act (the 'Hobbs Act') 1946 Federal Wire Act 1961 Bank Secrecy Act 1970 Organized Crime Control Act 1970 Title 21 of the United States Code 1970 Continuing Criminal Enterprise (contemporary) Racketeer Influenced and Corrupt Organizations Act (the 'RICO Act') 1970 Money Laundering Control Act 1986 United States Patriot Act 2001 Fraud Enforcement and Recovery Act of 2009 == By nation == List of criminal enterprises, gangs, and syndicates Timeline of organized crime Organized crime in Afghanistan Organized crime in Albania Organized crime in Australia Organized crime in Bulgaria Category:Organized crime in Canada Organized crime in China Organized crime in France Organized crime in Greece Organized crime in India Organized crime in Ireland Organized crime in Italy Organized crime in Japan Organized crime in Kenya Organized crime in Kyrgyzstan Organized crime in Lebanon Organized crime in the Netherlands Organized crime in Nigeria Organized crime in Pakistan Organized crime in Russia Organized crime in Romania Organized crime in Serbia Organized crime in South Korea Organized crime in Sweden Organized crime in Turkey Organized crime in Ukraine Organized crime in the United Kingdom Category:Organized crime in the United States Organized crime in Vietnam == References == == External links == Mob Life: Gangster Kings of Crime—slideshow by Life magazine UNODC—United Nations Office on Drugs and Crime—sub-section dealing with organized crime worldwide \"Organized Crime\" (Archived 2010-04-25 at the Wayback Machine)—Oxford Bibliographies Online: Criminology" ]
134974
Ridge-and-Valley Appalachians
The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge.
what valley is the eastern head of the ridge and valley ?
65
Great Appalachian Valley
The Ridge-and-Valley Appalachians, also called the Ridge and Valley Province or the Valley and Ridge Appalachians, are a physiographic province of the larger Appalachian Highlands division. The physiographic province is divided into three sections, the Hudson Valley, the Central, and the Tennessee. The river valleys were areas of indigenous settlements for thousands of years. In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee. Similarly, the Catawba people occupied areas along the upper Catawba River in Western North Carolina, to the east of Cherokee County. The ridge and valley system presents an important obstacle to east–west land travel even with today's technology. It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country. In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road. These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years. Early settlers of Ohio Country tended to enter it via the Ohio River; river systems were the most important transportation corridors. It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area. == Geography == The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge. The Valley and Ridge is located on the west side of the Blue Ridge Mountains. The province extends from southeastern New York in the north through northwestern New Jersey, westward into Pennsylvania through the Lehigh Valley, and southward into Maryland, West Virginia, Virginia, Kentucky, Tennessee, Georgia, and Alabama. They form a broad arc between the Blue Ridge Mountains and the Appalachian Plateau physiographic province (the Allegheny and Cumberland plateaus). They are characterized by long, even ridges, with long, continuous valleys in between. == Significant ridges (from north to south) == == Geology == The Valley and Ridge Province was formed during the Alleghanian orogeny, a mountain-building event that occurred between 325 and 260 million years ago. The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold. The softer parts of these rock units (chiefly shale and limestone) were eroded to form the valleys and the harder parts of the folds (quartzites) formed the mountain tops and ridges. The ridges represent the edges of the erosion-resistant strata, and the valleys portray the absence of the more erodible strata. Smaller streams have developed their valleys following the lines of the more easily eroded strata. A few major rivers, including the Delaware River, the Susquehanna River, the New River, and the Potomac River, are older than the present mountains, having cut water gaps that are perpendicular to hard strata ridges. The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure. The region was then uplifted slowly enough so that the rivers could maintain their course, cutting through the ridges as they developed. Valleys in the region are either synclinal or anticlinal. These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax. == See also == Allegheny Front Eastern Continental Divide Geology of the Appalachians Tennessee Valley Divide Tennessee Frontiers: Three Regions in Transition by John R. Finger == References == Stanley, Steven M. Earth System History. New York: W.H. Freeman and Company, 1999. ISBN 0-7167-2882-6
[ "The Ridge-and-Valley Appalachians, also called the Ridge and Valley Province or the Valley and Ridge Appalachians, are a physiographic province of the larger Appalachian Highlands division. The physiographic province is divided into three sections, the Hudson Valley, the Central, and the Tennessee. The river valleys were areas of indigenous settlements for thousands of years. In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee.", "In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee. Similarly, the Catawba people occupied areas along the upper Catawba River in Western North Carolina, to the east of Cherokee County. The ridge and valley system presents an important obstacle to east–west land travel even with today's technology.", "The ridge and valley system presents an important obstacle to east–west land travel even with today's technology. It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country.", "It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country. In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road.", "In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road. These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years.", "These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years. Early settlers of Ohio Country tended to enter it via the Ohio River; river systems were the most important transportation corridors. It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area.", "It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area. == Geography == The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge. The Valley and Ridge is located on the west side of the Blue Ridge Mountains.", "The Valley and Ridge is located on the west side of the Blue Ridge Mountains. The province extends from southeastern New York in the north through northwestern New Jersey, westward into Pennsylvania through the Lehigh Valley, and southward into Maryland, West Virginia, Virginia, Kentucky, Tennessee, Georgia, and Alabama. They form a broad arc between the Blue Ridge Mountains and the Appalachian Plateau physiographic province (the Allegheny and Cumberland plateaus). They are characterized by long, even ridges, with long, continuous valleys in between.", "They are characterized by long, even ridges, with long, continuous valleys in between. == Significant ridges (from north to south) == == Geology == The Valley and Ridge Province was formed during the Alleghanian orogeny, a mountain-building event that occurred between 325 and 260 million years ago. The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold.", "The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold. The softer parts of these rock units (chiefly shale and limestone) were eroded to form the valleys and the harder parts of the folds (quartzites) formed the mountain tops and ridges. The ridges represent the edges of the erosion-resistant strata, and the valleys portray the absence of the more erodible strata. Smaller streams have developed their valleys following the lines of the more easily eroded strata.", "Smaller streams have developed their valleys following the lines of the more easily eroded strata. A few major rivers, including the Delaware River, the Susquehanna River, the New River, and the Potomac River, are older than the present mountains, having cut water gaps that are perpendicular to hard strata ridges. The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure.", "The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure. The region was then uplifted slowly enough so that the rivers could maintain their course, cutting through the ridges as they developed. Valleys in the region are either synclinal or anticlinal. These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax.", "These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax. == See also == Allegheny Front Eastern Continental Divide Geology of the Appalachians Tennessee Valley Divide Tennessee Frontiers: Three Regions in Transition by John R. Finger == References == Stanley, Steven M. Earth System History. New York: W.H. Freeman and Company, 1999. ISBN 0-7167-2882-6" ]
134975
Ridge-and-Valley Appalachians
The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge.
where does the great appalachian valley originate ?
119
Blue Ridge
The Ridge-and-Valley Appalachians, also called the Ridge and Valley Province or the Valley and Ridge Appalachians, are a physiographic province of the larger Appalachian Highlands division. The physiographic province is divided into three sections, the Hudson Valley, the Central, and the Tennessee. The river valleys were areas of indigenous settlements for thousands of years. In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee. Similarly, the Catawba people occupied areas along the upper Catawba River in Western North Carolina, to the east of Cherokee County. The ridge and valley system presents an important obstacle to east–west land travel even with today's technology. It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country. In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road. These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years. Early settlers of Ohio Country tended to enter it via the Ohio River; river systems were the most important transportation corridors. It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area. == Geography == The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge. The Valley and Ridge is located on the west side of the Blue Ridge Mountains. The province extends from southeastern New York in the north through northwestern New Jersey, westward into Pennsylvania through the Lehigh Valley, and southward into Maryland, West Virginia, Virginia, Kentucky, Tennessee, Georgia, and Alabama. They form a broad arc between the Blue Ridge Mountains and the Appalachian Plateau physiographic province (the Allegheny and Cumberland plateaus). They are characterized by long, even ridges, with long, continuous valleys in between. == Significant ridges (from north to south) == == Geology == The Valley and Ridge Province was formed during the Alleghanian orogeny, a mountain-building event that occurred between 325 and 260 million years ago. The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold. The softer parts of these rock units (chiefly shale and limestone) were eroded to form the valleys and the harder parts of the folds (quartzites) formed the mountain tops and ridges. The ridges represent the edges of the erosion-resistant strata, and the valleys portray the absence of the more erodible strata. Smaller streams have developed their valleys following the lines of the more easily eroded strata. A few major rivers, including the Delaware River, the Susquehanna River, the New River, and the Potomac River, are older than the present mountains, having cut water gaps that are perpendicular to hard strata ridges. The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure. The region was then uplifted slowly enough so that the rivers could maintain their course, cutting through the ridges as they developed. Valleys in the region are either synclinal or anticlinal. These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax. == See also == Allegheny Front Eastern Continental Divide Geology of the Appalachians Tennessee Valley Divide Tennessee Frontiers: Three Regions in Transition by John R. Finger == References == Stanley, Steven M. Earth System History. New York: W.H. Freeman and Company, 1999. ISBN 0-7167-2882-6
[ "The Ridge-and-Valley Appalachians, also called the Ridge and Valley Province or the Valley and Ridge Appalachians, are a physiographic province of the larger Appalachian Highlands division. The physiographic province is divided into three sections, the Hudson Valley, the Central, and the Tennessee. The river valleys were areas of indigenous settlements for thousands of years. In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee.", "In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee. Similarly, the Catawba people occupied areas along the upper Catawba River in Western North Carolina, to the east of Cherokee County. The ridge and valley system presents an important obstacle to east–west land travel even with today's technology.", "The ridge and valley system presents an important obstacle to east–west land travel even with today's technology. It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country.", "It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country. In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road.", "In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road. These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years.", "These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years. Early settlers of Ohio Country tended to enter it via the Ohio River; river systems were the most important transportation corridors. It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area.", "It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area. == Geography == The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge. The Valley and Ridge is located on the west side of the Blue Ridge Mountains.", "The Valley and Ridge is located on the west side of the Blue Ridge Mountains. The province extends from southeastern New York in the north through northwestern New Jersey, westward into Pennsylvania through the Lehigh Valley, and southward into Maryland, West Virginia, Virginia, Kentucky, Tennessee, Georgia, and Alabama. They form a broad arc between the Blue Ridge Mountains and the Appalachian Plateau physiographic province (the Allegheny and Cumberland plateaus). They are characterized by long, even ridges, with long, continuous valleys in between.", "They are characterized by long, even ridges, with long, continuous valleys in between. == Significant ridges (from north to south) == == Geology == The Valley and Ridge Province was formed during the Alleghanian orogeny, a mountain-building event that occurred between 325 and 260 million years ago. The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold.", "The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold. The softer parts of these rock units (chiefly shale and limestone) were eroded to form the valleys and the harder parts of the folds (quartzites) formed the mountain tops and ridges. The ridges represent the edges of the erosion-resistant strata, and the valleys portray the absence of the more erodible strata. Smaller streams have developed their valleys following the lines of the more easily eroded strata.", "Smaller streams have developed their valleys following the lines of the more easily eroded strata. A few major rivers, including the Delaware River, the Susquehanna River, the New River, and the Potomac River, are older than the present mountains, having cut water gaps that are perpendicular to hard strata ridges. The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure.", "The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure. The region was then uplifted slowly enough so that the rivers could maintain their course, cutting through the ridges as they developed. Valleys in the region are either synclinal or anticlinal. These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax.", "These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax. == See also == Allegheny Front Eastern Continental Divide Geology of the Appalachians Tennessee Valley Divide Tennessee Frontiers: Three Regions in Transition by John R. Finger == References == Stanley, Steven M. Earth System History. New York: W.H. Freeman and Company, 1999. ISBN 0-7167-2882-6" ]
134976
Ridge-and-Valley Appalachians
The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge.
what are some of the steep side of the ridge and valley region ?
222
Allegheny Front, the Cumberland Mountains, and Walden Ridge
The Ridge-and-Valley Appalachians, also called the Ridge and Valley Province or the Valley and Ridge Appalachians, are a physiographic province of the larger Appalachian Highlands division. The physiographic province is divided into three sections, the Hudson Valley, the Central, and the Tennessee. The river valleys were areas of indigenous settlements for thousands of years. In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee. Similarly, the Catawba people occupied areas along the upper Catawba River in Western North Carolina, to the east of Cherokee County. The ridge and valley system presents an important obstacle to east–west land travel even with today's technology. It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country. In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road. These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years. Early settlers of Ohio Country tended to enter it via the Ohio River; river systems were the most important transportation corridors. It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area. == Geography == The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge. The Valley and Ridge is located on the west side of the Blue Ridge Mountains. The province extends from southeastern New York in the north through northwestern New Jersey, westward into Pennsylvania through the Lehigh Valley, and southward into Maryland, West Virginia, Virginia, Kentucky, Tennessee, Georgia, and Alabama. They form a broad arc between the Blue Ridge Mountains and the Appalachian Plateau physiographic province (the Allegheny and Cumberland plateaus). They are characterized by long, even ridges, with long, continuous valleys in between. == Significant ridges (from north to south) == == Geology == The Valley and Ridge Province was formed during the Alleghanian orogeny, a mountain-building event that occurred between 325 and 260 million years ago. The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold. The softer parts of these rock units (chiefly shale and limestone) were eroded to form the valleys and the harder parts of the folds (quartzites) formed the mountain tops and ridges. The ridges represent the edges of the erosion-resistant strata, and the valleys portray the absence of the more erodible strata. Smaller streams have developed their valleys following the lines of the more easily eroded strata. A few major rivers, including the Delaware River, the Susquehanna River, the New River, and the Potomac River, are older than the present mountains, having cut water gaps that are perpendicular to hard strata ridges. The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure. The region was then uplifted slowly enough so that the rivers could maintain their course, cutting through the ridges as they developed. Valleys in the region are either synclinal or anticlinal. These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax. == See also == Allegheny Front Eastern Continental Divide Geology of the Appalachians Tennessee Valley Divide Tennessee Frontiers: Three Regions in Transition by John R. Finger == References == Stanley, Steven M. Earth System History. New York: W.H. Freeman and Company, 1999. ISBN 0-7167-2882-6
[ "The Ridge-and-Valley Appalachians, also called the Ridge and Valley Province or the Valley and Ridge Appalachians, are a physiographic province of the larger Appalachian Highlands division. The physiographic province is divided into three sections, the Hudson Valley, the Central, and the Tennessee. The river valleys were areas of indigenous settlements for thousands of years. In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee.", "In the historic period, the Cherokee people had towns along many of the rivers in western South Carolina and North Carolina, as well as on the western side of the Appalachian Mountains in present-day Tennessee. Similarly, the Catawba people occupied areas along the upper Catawba River in Western North Carolina, to the east of Cherokee County. The ridge and valley system presents an important obstacle to east–west land travel even with today's technology.", "The ridge and valley system presents an important obstacle to east–west land travel even with today's technology. It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country.", "It was a nearly insurmountable barrier to European-American migrants who walked or rode horses traveling west to settle the Ohio Country, and later the Northwest Territory and Oregon Country. In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road.", "In the era when animal power dominated transportation, there was no safe way to cross east–west in the middle of the range; crossing was only possible nearer its extremes except for a few rough passages opened mid-range during the colonial era, such as Cumberland Gap, Braddock's Road and Forbes Road. These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years.", "These were later improved as America's first National Roads, including Wilderness Road, Cumberland Road, Lincoln Highway, designated as U.S. Route 40 and U.S. Route 30 in later years. Early settlers of Ohio Country tended to enter it via the Ohio River; river systems were the most important transportation corridors. It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area.", "It was difficult in the late 19th and 20th centuries to construct railroads and modern highways through this area. == Geography == The eastern head of the Ridge and Valley region is marked by the Great Appalachian Valley, which lies just west of the Blue Ridge. The western side of the Ridge and Valley region is marked by steep escarpments such as the Allegheny Front, the Cumberland Mountains, and Walden Ridge. The Valley and Ridge is located on the west side of the Blue Ridge Mountains.", "The Valley and Ridge is located on the west side of the Blue Ridge Mountains. The province extends from southeastern New York in the north through northwestern New Jersey, westward into Pennsylvania through the Lehigh Valley, and southward into Maryland, West Virginia, Virginia, Kentucky, Tennessee, Georgia, and Alabama. They form a broad arc between the Blue Ridge Mountains and the Appalachian Plateau physiographic province (the Allegheny and Cumberland plateaus). They are characterized by long, even ridges, with long, continuous valleys in between.", "They are characterized by long, even ridges, with long, continuous valleys in between. == Significant ridges (from north to south) == == Geology == The Valley and Ridge Province was formed during the Alleghanian orogeny, a mountain-building event that occurred between 325 and 260 million years ago. The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold.", "The rocks in the region were subjected to immense pressure and heat, causing them to deform and fold. The softer parts of these rock units (chiefly shale and limestone) were eroded to form the valleys and the harder parts of the folds (quartzites) formed the mountain tops and ridges. The ridges represent the edges of the erosion-resistant strata, and the valleys portray the absence of the more erodible strata. Smaller streams have developed their valleys following the lines of the more easily eroded strata.", "Smaller streams have developed their valleys following the lines of the more easily eroded strata. A few major rivers, including the Delaware River, the Susquehanna River, the New River, and the Potomac River, are older than the present mountains, having cut water gaps that are perpendicular to hard strata ridges. The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure.", "The evidence points to a wearing down of the entire region to a low level with little relief, so that major rivers were flowing in unconsolidated sediments unaffected by the underlying rock structure. The region was then uplifted slowly enough so that the rivers could maintain their course, cutting through the ridges as they developed. Valleys in the region are either synclinal or anticlinal. These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax.", "These mountains are at their development in central Pennsylvania, a phenomenon termed the Pennsylvania climax. == See also == Allegheny Front Eastern Continental Divide Geology of the Appalachians Tennessee Valley Divide Tennessee Frontiers: Three Regions in Transition by John R. Finger == References == Stanley, Steven M. Earth System History. New York: W.H. Freeman and Company, 1999. ISBN 0-7167-2882-6" ]
134987
Mnemonic
Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques.
who distinguished between two types of memory ?
0
Ancient Greeks and Romans
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]
134988
Mnemonic
Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques.
what are the two types of memory ?
69
the "natural" memory and the "artificial" memory
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]
134989
Mnemonic
Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques.
what is the former name of the word `` everyone '' ?
133
inborn
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]
134990
Mnemonic
Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques.
what is the term for the one that is the one of the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one that is the one of the
175
instinctively
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]
134991
Mnemonic
Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques.
what is the practice of a variety of learning ?
295
mnemonic techniques
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]
135021
Mnemonic
To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily.
what are strange words in difficult hexameter scansion ?
156
no means easy to memorise
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]
135029
Mnemonic
A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits.
what are the most commonly used mnemonics ?
81
mnemonics
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]
135030
Mnemonic
A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits.
what are the most commonly used mnemonics ?
105
lists, numerical sequences, foreign-language acquisition
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]
135032
Mnemonic
Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi.
what is another name for the first 15 digits ?
275
3.14159265358979
A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise "relatable" information, rather than more abstract or impersonal forms of information. The word "mnemonic" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne ("remembrance"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the "natural" memory and the "artificial" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as "topical" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the "most fertile secret" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent "original" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. "Richard of York gave battle in vain" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g. "Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e.: the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include "memory needs every method of nurturing its capacity" and "maybe not every mnemonic oozes nuisance intensely concentrated". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. "Tangiest Pez? Yellow!" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic "Father Charles goes down and ends battle". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ ("Battle ends and down goes Charles's father"). The colours of the rainbow in "Richard of York gave battle in vain", "Run over your granny because it's violent" or the fictional name "Roy G. Biv" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase "Eli the iceman" or "Eli on ice" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in "Eli". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in "ice". Another common mnemonic is "civil": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase "Leo says ger" (lose electron oxidation, gain electron reduction) or acronym "oil rig" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: "My very educated mother just served us nachos" or "my very easy method just speeds up naming planets" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: "Oh, be a fine girl [or guy], kiss me!" – where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: "Please do not teach students pointless acronyms" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include "Do kings play chess on funny glass stairs?" and "Do kindly please come over for green soup." (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or "have no fear of ice cold beer". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: "Dash in a real rush! Hurry, or else accident!" For the parts of the brain associated with memory: "herds of animals cause panic" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: "mother eats squirrel guts because she is living in rural Arkansas" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as "Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics"; "Now", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for "calculating" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\displaystyle P=U\times I} and U = R × I {\displaystyle U=R\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called "cognates" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence "Oh hell, there's a raccoon in my tent". The memorable sentence "There's a fork in Ma's leg" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence "that's a lovely house, I'd like to buy it." The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase "to be a star".Another Spanish example is by using the mnemonic "Vin Diesel Has Ten Weapons" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember "Ven Di Sal Haz Ten Ve Pon Sé", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for "foot", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): "Neither can a breeze make a sane Japanese chilly in the USA." (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably "The Magical Number Seven, Plus or Minus Two") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary
[ "A mnemonic device ( nih-MON-ik), or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imagery as specific tools to encode information in a way that allows for efficient storage and retrieval. Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information.", "Mnemonics aid original information in becoming associated with something more accessible or meaningful—which, in turn, provides better retention of the information. Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms.", "Commonly encountered mnemonics are often used for lists and in auditory form, such as short poems, acronyms, initialisms, or memorable phrases, but mnemonics can also be used for other types of information and in visual or kinesthetic forms. Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information.", "Their use is based on the observation that the human mind more easily remembers spatial, personal, surprising, physical, sexual, humorous, or otherwise \"relatable\" information, rather than more abstract or impersonal forms of information. The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology.", "The word \"mnemonic\" is derived from the Ancient Greek word μνημονικός (mnēmonikos), meaning 'of memory' or 'relating to memory' and is related to Mnemosyne (\"remembrance\"), the name of the goddess of memory in Greek mythology. Both of these words are derived from μνήμη (mnēmē), 'remembrance, memory'. Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory.", "Mnemonics in antiquity were most often considered in the context of what is today known as the art of memory. Ancient Greeks and Romans distinguished between two types of memory: the \"natural\" memory and the \"artificial\" memory. The former is inborn, and is the one that everyone uses instinctively. The latter in contrast has to be trained and developed through the learning and practice of a variety of mnemonic techniques. Mnemonic systems are techniques or strategies consciously used to improve memory.", "Mnemonic systems are techniques or strategies consciously used to improve memory. They help use information already stored in long-term memory to make memorization an easier task. == History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive.", "== History == The general name of mnemonics, or memoria technica, was the name applied to devices for aiding the memory, to enable the mind to reproduce a relatively unfamiliar idea, and especially a series of dissociated ideas, by connecting it, or them, in some artificial whole, the parts of which are mutually suggestive. Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle.", "Mnemonic devices were much cultivated by Greek sophists and philosophers and are frequently referred to by Plato and Aristotle. Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous.", "Philosopher Charmadas was famous for his outstanding memory and for his ability to memorize whole books and then recite them.In later times, the poet Simonides was credited for development of these techniques, perhaps for no reason other than that the power of his memory was famous. Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory.", "Cicero, who attaches considerable importance to the art, but more to the principle of order as the best help to memory, speaks of Carneades (perhaps Charmades) of Athens and Metrodorus of Scepsis as distinguished examples of people who used well-ordered images to aid the memory. The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics.", "The Romans valued such helps in order to support facility in public speaking.The Greek and the Roman system of mnemonics was founded on the use of mental places and signs or pictures, known as \"topical\" mnemonics. The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures.", "The most usual method was to choose a large house, of which the apartments, walls, windows, statues, furniture, etc., were each associated with certain names, phrases, events or ideas, by means of symbolic pictures. To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination.", "To recall these, an individual had only to search over the apartments of the house until discovering the places where images had been placed by the imagination. In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling.", "In accordance with this system, if it were desired to fix a historic date in memory, it was localised in an imaginary town divided into a certain number of districts, each with ten houses, each house with ten rooms, and each room with a hundred quadrates or memory-places, partly on the floor, partly on the four walls, partly on the ceiling. Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town.", "Therefore, if it were desired to fix in the memory the date of the invention of printing (1436), an imaginary book, or some other symbol of printing, would be placed in the thirty-sixth quadrate or memory-place of the fourth room of the first house of the historic district of the town. Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa.", "Except that the rules of mnemonics are referred to by Martianus Capella, nothing further is known regarding the practice until the 13th century.Among the voluminous writings of Roger Bacon is a tractate De arte memorativa. Ramon Llull devoted special attention to mnemonics in connection with his ars generalis. The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places.", "The first important modification of the method of the Romans was that invented by the German poet Conrad Celtes, who, in his Epitoma in utramque Ciceronis rhetoricam cum arte memorativa nova (1492), used letters of the alphabet for associations, rather than places. About the end of the 15th century, Peter of Ravenna (b. 1448) provoked such astonishment in Italy by his mnemonic feats that he was believed by many to be a necromancer. His Phoenix artis memoriae (Venice, 1491, 4 vols.)", "His Phoenix artis memoriae (Venice, 1491, 4 vols.) went through as many as nine editions, the seventh being published at Cologne in 1608. About the end of the 16th century, Lambert Schenkel (Gazophylacium, 1610), who taught mnemonics in France, Italy and Germany, similarly surprised people with his memory. He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty.", "He was denounced as a sorcerer by the University of Louvain, but in 1593 he published his tractate De memoria at Douai with the sanction of that celebrated theological faculty. The most complete account of his system is given in two works by his pupil Martin Sommer, published in Venice in 1619. In 1618 John Willis (d. 1628?) published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics.", "published Mnemonica; sive ars reminiscendi, containing a clear statement of the principles of topical or local mnemonics. Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull.", "Giordano Bruno included a memoria technica in his treatise De umbris idearum, as part of his study of the ars generalis of Llull. Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered.", "Other writers of this period are the Florentine Publicius (1482); Johannes Romberch (1533); Hieronimo Morafiot, Ars memoriae (1602);and B. Porta, Ars reminiscendi (1602).In 1648 Stanislaus Mink von Wennsshein revealed what he called the \"most fertile secret\" in mnemonics—using consonants for figures, thus expressing numbers by words (vowels being added as required), in order to create associations more readily remembered. The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages.", "The philosopher Gottfried Wilhelm Leibniz adopted an alphabet very similar to that of Wennsshein for his scheme of a form of writing common to all languages. Wennsshein's method was adopted with slight changes afterward by the majority of subsequent \"original\" systems. It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730.", "It was modified and supplemented by Richard Grey (1694–1771), a priest who published a Memoria technica in 1730. The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer.", "The principal part of Grey's method is briefly this: To remember anything in history, chronology, geography, etc., a word is formed, the beginning whereof, being the first syllable or syllables of the thing sought, does, by frequent repetition, of course draw after it the latter part, which is so contrived as to give the answer. Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates.", "Thus, in history, the Deluge happened in the year before Christ two thousand three hundred forty-eight; this is signified by the word Del-etok, Del standing for Deluge and etok for 2348.Wennsshein's method is comparable to a Hebrew system by which letters also stand for numerals, and therefore words for dates. To assist in retaining the mnemonical words in the memory, they were formed into memorial lines. Such strange words in difficult hexameter scansion, are by no means easy to memorise.", "Such strange words in difficult hexameter scansion, are by no means easy to memorise. The vowel or consonant, which Grey connected with a particular figure, was chosen arbitrarily. A later modification was made in 1806 Gregor von Feinaigle, a German monk from Salem near Constance. While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it.", "While living and working in Paris, he expounded a system of mnemonics in which (as in Wennsshein) the numerical figures are represented by letters chosen due to some similarity to the figure or an accidental connection with it. This alphabet was supplemented by a complicated system of localities and signs. Feinaigle, who apparently did not publish any written documentation of this method, travelled to England in 1811. The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system.", "The following year one of his pupils published The New Art of Memory (1812), giving Feinaigle's system. In addition, it contains valuable historical material about previous systems. Other mnemonists later published simplified forms, as the more complicated mnemonics were generally abandoned. Methods founded chiefly on the so-called laws of association (cf. Mental association) were taught with some success in Germany. == Types == 1. Music mnemonics Songs and jingles can be used as a mnemonic.", "Music mnemonics Songs and jingles can be used as a mnemonic. A common example is how children remember the alphabet by singing the ABCs.2. Name mnemonics (acronym) The first letter of each word is combined into a new word. For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3.", "For example: VIBGYOR (or ROY G BIV) for the colours of the rainbow or HOMES (Lake Huron, Lake Ontario, Lake Michigan, Lake Erie, Lake Superior) the Great Lakes.3. Acrostic mnemonics The first letter of each word is combined to form a phrase or sentence – e.g. \"Richard of York gave battle in vain\" for the colours of the rainbow.4. Model mnemonics A model is used to help recall information.", "Model mnemonics A model is used to help recall information. Applications of this method involve the use of diagrams, cycles, graphs, and flowcharts to help understand or memorize an idea. e.g. Freytag's Pyramid to show the different parts of a five-act dramatic structure.5. Ode mnemonics The information is placed into a poem or doggerel, – e.g.", "Ode mnemonics The information is placed into a poem or doggerel, – e.g. \"Note socer, gener, liberi, and Liber god of revelry, like puer these retain the 'e'\" (most Latin nouns of the second declension ending in -er drop the -e in all of the oblique cases except the vocative, these are the exceptions).6. Note organization mnemonics The method of note organization can be used as a memorization technique. Applications of this method involve the use of flash cards and lists.", "Applications of this method involve the use of flash cards and lists. Flash cards are used by putting a question or word on one side of a paper and the answer or definition on the other side of the paper. Lists involve the organization of data from broad to detailed. e.g. Earth → Continent → Country.7. Image mnemonics The information is constructed into a picture – e.g.", "Image mnemonics The information is constructed into a picture – e.g. the German weak declension can be remembered as five '-e's', looking rather like the state of Oklahoma in America, in a sea of '-en's'.8. Connection mnemonics New knowledge is connected to knowledge already known.9. Visualization mnemonics Techniques such as the method of loci allow the user to create unique associations in an imagined space. == Applications and examples == A wide range of mnemonics are used for several purposes.", "== Applications and examples == A wide range of mnemonics are used for several purposes. The most commonly used mnemonics are those for lists, numerical sequences, foreign-language acquisition, and medical treatment for patients with memory deficits. === For lists === A common mnemonic technique for remembering a list is to create an easily remembered acronym. Another is to create a memorable phrase with words which share the same first letter(s) (i.e. : the same initialism) as the list members.", ": the same initialism) as the list members. : the same initialism) as the list members. Mnemonic techniques can be applied to most memorization of novel materials. Some common examples for first-letter mnemonics: Mnemonics for spelling mnemonic include \"memory needs every method of nurturing its capacity\" and \"maybe not every mnemonic oozes nuisance intensely concentrated\". To memorize the metric prefixes after giga, think of the candy, and this mnemonic. \"Tangiest Pez? Yellow!\"", "\"Tangiest Pez? Yellow!\" Yellow!\" TPEZY: tera, peta, exa, zetta, yotta. The order of sharps in key signature notation is F, C, G, D, A, E and B, giving the mnemonic \"Father Charles goes down and ends battle\". The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\").", "The order of flats is the reverse: B♭, E♭, A♭, D♭, G♭, C♭ and F♭ (\"Battle ends and down goes Charles's father\"). The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet).", "The colours of the rainbow in \"Richard of York gave battle in vain\", \"Run over your granny because it's violent\" or the fictional name \"Roy G. Biv\" (red, orange, yellow, green, blue, indigo, violet). The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions.", "The acronym HOMES for the North American Great Lakes: Huron, Ontario, Michigan, Erie, and Superior Electronic colour codes are remembered with a wide range of mnemonic phrases, owing to multiple colours beginning with b and g and shifts from sexist phrases once common in traditionally male-dominated professions. For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers.", "For effects of an inductor or capacitor in alternating current circuits, the phrase \"Eli the iceman\" or \"Eli on ice\" has been used by electrical engineers. With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\".", "With an inductor present (the symbol L indicating inductance), the peak value of voltage (E) precedes the peak value of the current (I), so E precedes I in \"Eli\". With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\".", "With a capacitor present (the symbol C indicating capacitance), the peak current leads the peak voltage, with I leading E when C is present in \"ice\". Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L).", "Another common mnemonic is \"civil\": in a capacitor (C) current (I) leads voltage (V), while voltage leads current in a inductor (L). For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used.", "For redox chemical reactions, where oxidation and reduction can be confused, the phrase \"Leo says ger\" (lose electron oxidation, gain electron reduction) or acronym \"oil rig\" (oxidation is losing, reduction is gaining) can be used. Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]).", "Planetary mnemonics include: \"My very educated mother just served us nachos\" or \"my very easy method just speeds up naming planets\" (Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, [Pluto]). The sequence of stellar classification: \"Oh, be a fine girl [or guy], kiss me!\" – where O, B, A, F, G, K, M are categories of stars.", "– where O, B, A, F, G, K, M are categories of stars. For the layers of the OSI Model: \"Please do not teach students pointless acronyms\" (physical, data link, network, transport, session, presentation, application). Taxonomy mnemonics include \"Do kings play chess on funny glass stairs?\" and \"Do kindly please come over for green soup.\"", "and \"Do kindly please come over for green soup.\" (domain, kingdom, phylum, class, order, family, genus, species) For diatomic elements: BrINClHOF (pronounced 'brinkelhoff') or \"have no fear of ice cold beer\". For adjective order in English grammar: OPSHACOM (opinion, shape, age, colour, origin, material). For the spelling of diarrhoea: \"Dash in a real rush! Hurry, or else accident!\"", "Hurry, or else accident!\" Hurry, or else accident!\" For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi.", "For the parts of the brain associated with memory: \"herds of animals cause panic\" (hippocampus, amygdala, cerebellum, prefrontal cortex) For types of memory encoding: SAVE (semantic, acoustic, and visual encoding) For parts of the digestive system: \"mother eats squirrel guts because she is living in rural Arkansas\" (mouth, esophagus, stomach, gall bladder, small intestine, large intestine, rectum, anus) === For numerical sequences and mathematical operations === Mnemonic phrases or poems can be used to encode numeric sequences by various methods, one common one is to create a new phrase in which the number of letters in each word represents the according digit of pi. For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3.", "For example, the first 15 digits of the mathematical constant pi (3.14159265358979) can be encoded as \"Now I need a drink, alcoholic of course, after the heavy lectures involving quantum mechanics\"; \"Now\", having 3 letters, represents the first number, 3. Piphilology is the practice dedicated to creating mnemonics for pi. Another is used for \"calculating\" the multiples of 9 up to 9 × 10 using one's fingers. Begin by holding out both hands with all fingers stretched out.", "Begin by holding out both hands with all fingers stretched out. Now count left to right the number of fingers that indicates the multiple. For example, to figure 9 × 4, count four fingers from the left, ending at your left-hand index finger. Bend this finger down and count the remaining fingers. Fingers to the left of the bent finger represent tens, fingers to the right are ones. There are three fingers to the left and six to the right, which indicates 9 × 4 = 36.", "There are three fingers to the left and six to the right, which indicates 9 × 4 = 36. This works for 9 × 1 up through 9 × 10.", "This works for 9 × 1 up through 9 × 10. For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} .", "For remembering the rules in adding and multiplying two signed numbers, Balbuena and Buayan (2015) made the letter strategies LAUS (like signs, add; unlike signs, subtract) and LPUN (like signs, positive; unlike signs, negative), respectively.PUIMURI ('thresher') is a Finnish mnemonic regarding electricity: the first and last three letters can be arranged into the equations P = U × I {\\displaystyle P=U\\times I} and U = R × I {\\displaystyle U=R\\times I} . (The letter M is discarded, which can be explained with another, politically incorrect mnemonic.)", "(The letter M is discarded, which can be explained with another, politically incorrect mnemonic.) === For foreign-language acquisition === Mnemonics may be helpful in learning foreign languages, for example by transposing difficult foreign words with words in a language the learner knows already, also called \"cognates\" which are very common in the Spanish language. A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word.", "A useful such technique is to find linkwords, words that have the same pronunciation in a known language as the target word, and associate them visually or auditorially with the target word. For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\".", "For example, in trying to assist the learner to remember ohel (אוהל‎), the Hebrew word for tent, the linguist Ghil'ad Zuckermann proposes the memorable sentence \"Oh hell, there's a raccoon in my tent\". The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎).", "The memorable sentence \"There's a fork in Ma's leg\" helps the learner remember that the Hebrew word for fork is mazleg (מזלג‎). Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\"", "Similarly, to remember the Hebrew word bayit (בית‎), meaning house, one can use the sentence \"that's a lovely house, I'd like to buy it.\" The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form.", "The linguist Michel Thomas taught students to remember that estar is the Spanish word for to be by using the phrase \"to be a star\".Another Spanish example is by using the mnemonic \"Vin Diesel Has Ten Weapons\" to teach irregular command verbs in the you (tú) form. Spanish verb forms and tenses are regularly seen as the hardest part of learning the language.", "Spanish verb forms and tenses are regularly seen as the hardest part of learning the language. With a high number of verb tenses, and many verb forms that are not found in English, Spanish verbs can be hard to remember and then conjugate. The use of mnemonics has been proven to help students better learn foreign languages, and this holds true for Spanish verbs. A particularly hard verb tense to remember is command verbs. Command verbs in Spanish are conjugated differently depending on who the command is being given to.", "Command verbs in Spanish are conjugated differently depending on who the command is being given to. The phrase, when pronounced with a Spanish accent, is used to remember \"Ven Di Sal Haz Ten Ve Pon Sé\", all of the irregular Spanish command verbs in the you (tú) form. This mnemonic helps students attempting to memorize different verb tenses. Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language.", "Another technique is for learners of gendered languages to associate their mental images of words with a colour that matches the gender in the target language. An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example).", "An example here is to remember the Spanish word for \"foot\", pie, [pee-ay] with the image of a foot stepping on a pie, which then spills blue filling (blue representing the male gender of the noun in this example). For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer.", "For French verbs which use être as an auxiliary verb for compound tenses: DR and MRS VANDERTRAMPP: descendre, rester, monter, revenir, sortir, venir, arriver, naître, devenir, entrer, rentrer, tomber, retourner, aller, mourir, partir, passer. Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\"", "Masculine countries in French (le): \"Neither can a breeze make a sane Japanese chilly in the USA.\" (les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique).", "(les) Netherlands (Pays-Bas), Canada, Brazil (Brésil), Mexico (Mexique), Senegal, Japan (Japon), Chile (Chili), & (les) USA (États-Unis d'Amérique). === For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions.", "=== For patients with memory deficits === Mnemonics can be used in aiding patients with memory deficits that could be caused by head injuries, strokes, epilepsy, multiple sclerosis and other neurological conditions. In a study conducted by Doornhein and De Haan, the patients were treated with six different memory strategies including the mnemonics technique. The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment.", "The results concluded that there were significant improvements on the immediate and delayed subtest of the RBMT, delayed recall on the Appointments test, and relatives rating on the MAC from the patients that received mnemonics treatment. However, in the case of stroke patients, the results did not reach statistical significance. == Effectiveness == Academic study of the use of mnemonics has shown their effectiveness.", "== Effectiveness == Academic study of the use of mnemonics has shown their effectiveness. In one such experiment, subjects of different ages who applied mnemonic techniques to learn novel vocabulary outperformed control groups that applied contextual learning and free-learning styles.Mnemonics were seen to be more effective for groups of people who struggled with or had weak long-term memory, like the elderly. Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over.", "Five years after a mnemonic training study, a research team followed-up 112 community-dwelling older adults, 60 years of age and over. Delayed recall of a word list was assessed prior to, and immediately following mnemonic training, and at the 5-year follow-up. Overall, there was no significant difference between word recall prior to training and that exhibited at follow-up. However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up.", "However, pre-training performance gains scores in performance immediately post-training and use of the mnemonic predicted performance at follow-up. Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training.", "Individuals who self-reported using the mnemonic exhibited the highest performance overall, with scores significantly higher than at pre-training. The findings suggest that mnemonic training has long-term benefits for some older adults, particularly those who continue to employ the mnemonic.This contrasts with a study from surveys of medical students that approximately only 20% frequently used mnemonic acronyms.In humans, the process of aging particularly affects the medial temporal lobe and hippocampus, in which the episodic memory is synthesized. The episodic memory stores information about items, objects, or features with spatiotemporal contexts.", "The episodic memory stores information about items, objects, or features with spatiotemporal contexts. Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function.", "Since mnemonics aid better in remembering spatial or physical information rather than more abstract forms, its effect may vary according to a subject's age and how well the subject's medial temporal lobe and hippocampus function. This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years).", "This could be further explained by one recent study which indicates a general deficit in the memory for spatial locations in aged adults (mean age 69.7 with standard deviation of 7.4 years) compared to young adults (mean age 21.7 with standard deviation of 4.2 years). At first, the difference in target recognition was not significant. The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing.", "The researchers then divided the aged adults into two groups, aged unimpaired and aged impaired, according to a neuropsychological testing. With the aged groups split, there was an apparent deficit in target recognition in aged impaired adults compared to both young adults and aged unimpaired adults. This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al.", "This further supports the varying effectiveness of mnemonics in different age groups.Moreover, different research was done previously with the same notion, which presented with similar results to that of Reagh et al. in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "in a verbal mnemonics discrimination task.Studies (notably \"The Magical Number Seven, Plus or Minus Two\") have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories. == See also == == References == == External links == The dictionary definition of mnemonic at Wiktionary" ]